ghackebeil / PyORAMLinks
Python-based Oblivious RAM
☆29Updated 5 years ago
Alternatives and similar repositories for PyORAM
Users that are interested in PyORAM are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- ☆13Updated 7 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆57Updated 5 years ago
- The compiler for ObliVM☆65Updated 4 years ago
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Updated 4 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Updated 7 years ago
- ExitLess services for SGX enclaves☆33Updated 5 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆122Updated last year
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆165Updated 2 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- Path ORAM reference implementation☆29Updated 4 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆43Updated 8 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆80Updated 2 years ago
- ☆30Updated 2 years ago
- ☆49Updated last year
- ☆28Updated 5 years ago
- ☆182Updated 4 years ago
- High-level performance analyser toolkit for Intel SGX☆39Updated 5 years ago
- Example on how to use the Intel SGX implementation of AES-GCM☆28Updated 6 years ago
- Secure auditing of Internet services with Intel SGX☆22Updated 4 years ago
- XPIR: Private Information Retrieval for Everyone☆118Updated 3 years ago
- Marble FHE Library☆18Updated 4 years ago
- mbedtls-SGX: a SGX-friendly TLS stack (ported from mbedtls)☆90Updated 5 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 7 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆22Updated 6 years ago
- Recursive unified ORAM☆15Updated 9 years ago
- A code confidentiality framework for Intel SGX☆17Updated 6 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Updated 4 years ago
- CUDA Homomorphic Encryption Library☆201Updated 8 years ago