An implementation of Oblivious RAM
☆35Feb 12, 2025Updated last year
Alternatives and similar repositories for oram
Users that are interested in oram are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Enabling credibly pseudonymous posting @ heyanon.xyz☆31Nov 23, 2022Updated 3 years ago
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆80Feb 13, 2026Updated last month
- Incremental Offline/Online PIR☆14Apr 4, 2024Updated last year
- Javascript implementation of the Ristretto255 group operations, built on top of the popular TweetNaCl.js crypto library☆33Dec 13, 2023Updated 2 years ago
- An implementation of an auditable key directory☆311Mar 5, 2026Updated 2 weeks ago
- ☆22May 14, 2024Updated last year
- Common MPC Pitfalls☆12Mar 16, 2026Updated last week
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Sep 25, 2024Updated last year
- ☆13Feb 3, 2026Updated last month
- Extractable Witness Encryption for KZG Commitments☆32Nov 29, 2024Updated last year
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆44Jan 7, 2021Updated 5 years ago
- Verifiable FHE prototype☆27Aug 12, 2024Updated last year
- ☆12Aug 6, 2023Updated 2 years ago
- Web simulator for NDN☆14Jan 13, 2026Updated 2 months ago
- BLS Signature Library☆15Jun 10, 2016Updated 9 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Dec 6, 2022Updated 3 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- Versatile framework for multi-party computation on the web. Based on the implementation of MP-SPDZ.☆16Aug 13, 2025Updated 7 months ago
- Groth16 over ICICLE☆44Jul 16, 2025Updated 8 months ago
- A 2-round lattice-based threshold signature from standard assumptions☆17Apr 11, 2025Updated 11 months ago
- A framework for deploying on-demand distributed-trust.☆14Jun 4, 2024Updated last year
- Attribute-based Access Control over Named Data Networking☆17Jul 18, 2025Updated 8 months ago
- Prove multi-opens of EIP-4844 KZG blobs☆16Jun 15, 2023Updated 2 years ago
- Implementation of Prio in Rust.☆117Updated this week
- Benchmarks for various multi-party computation frameworks☆18Oct 28, 2024Updated last year
- ☆10Apr 5, 2017Updated 8 years ago
- A lattice-based non-interactive folding scheme written in Rust☆126Dec 17, 2025Updated 3 months ago
- A media player with a table of contents☆14Nov 7, 2020Updated 5 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Sep 10, 2024Updated last year
- ☆10Mar 4, 2024Updated 2 years ago
- ☆63Feb 10, 2026Updated last month
- lattice-based zkSNARKs over libsnark [ISW21]☆36Oct 18, 2024Updated last year
- Rust library for ZKBoogie, ZKBoo-based ZKP scheme optimized for client-side proving and its recursion.☆11Jun 5, 2024Updated last year
- Implementation of Brakerski's leveled homomorphic encryption system☆44Feb 12, 2017Updated 9 years ago
- Threshold MPC protocols for FHE☆59Feb 5, 2026Updated last month
- Grain of Salt equation generator☆16May 6, 2022Updated 3 years ago
- Version 2 of ZKaggle, 🏆 Finalist of ETHGlobal FVM Space Warp Hack☆16Jul 12, 2023Updated 2 years ago
- Secure distributed dataflow framework for encrypted machine learning and data processing☆70Mar 20, 2024Updated 2 years ago
- Send and receive files or stream data encrypted over a local network.☆14Mar 6, 2023Updated 3 years ago