Tool for Automating efficient Secure Two-partY computation protocols
☆10Nov 10, 2016Updated 9 years ago
Alternatives and similar repositories for tasty
Users that are interested in tasty are comparing it to the libraries listed below
Sorting:
- Toolbox for Automatic Secure Two-partY computation☆10May 6, 2016Updated 9 years ago
- A Flexible Efficient Secure Computation Backend☆33May 26, 2018Updated 7 years ago
- The compiler for ObliVM☆65Sep 1, 2020Updated 5 years ago
- ☆184Jun 21, 2021Updated 4 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Jul 6, 2021Updated 4 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆28Apr 15, 2024Updated last year
- Implementations of Private Set Intersection Protocols☆188Jun 27, 2025Updated 8 months ago
- ☆28Sep 16, 2019Updated 6 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆26Oct 15, 2020Updated 5 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆128Nov 14, 2023Updated 2 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Dec 26, 2018Updated 7 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆35Jun 10, 2021Updated 4 years ago
- A Secure Multiparty Computation (MPC) protocol for computing linear regression on vertically distributed datasets.☆32Apr 16, 2019Updated 6 years ago
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆37Oct 12, 2017Updated 8 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- Implementation of a simple linear regression algorithm in MAMBA☆10Feb 12, 2020Updated 6 years ago
- Python scripts for KiCad☆11Mar 21, 2016Updated 9 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆91Jul 20, 2023Updated 2 years ago
- A Low Poly Style Picture Generator by Python☆11Feb 21, 2019Updated 7 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Prototype firmware for 3d printers on an STM32F4xxx☆10Feb 26, 2021Updated 5 years ago
- Project Horus's Binary Telemetry Utilities☆11Sep 29, 2020Updated 5 years ago
- ☆12Nov 4, 2022Updated 3 years ago
- Notes and code for developing hobby OS's for the Raspberry PI☆28Nov 30, 2014Updated 11 years ago
- ☆11May 17, 2021Updated 4 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Xiaomi Mi Body Fat Smart Scale version 2 (MIBFS).☆10Jul 16, 2020Updated 5 years ago
- Common MPC Pitfalls☆12Feb 14, 2026Updated 2 weeks ago
- The hello-world of MPC.☆14Jun 16, 2025Updated 8 months ago
- Python library for interacting with Logitech Media Servers☆16Feb 12, 2022Updated 4 years ago
- ☆15Feb 25, 2026Updated last week
- My custom kali live build configuration☆10Jan 29, 2021Updated 5 years ago
- Power line communication through processor load modulation☆12Jul 24, 2017Updated 8 years ago
- Docker image for Elastic Filebeat☆11Oct 2, 2017Updated 8 years ago
- Emoji-based language built in ruby☆10Nov 20, 2015Updated 10 years ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆20Feb 24, 2026Updated last week
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- ☆10Nov 29, 2020Updated 5 years ago
- ☆11Aug 2, 2016Updated 9 years ago