ghackebeil / PyORAMLinks
Python-based Oblivious RAM
☆29Updated 6 years ago
Alternatives and similar repositories for PyORAM
Users that are interested in PyORAM are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆61Updated 2 years ago
- ☆13Updated 7 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆59Updated 5 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆171Updated 2 years ago
- The compiler for ObliVM☆65Updated 5 years ago
- Path ORAM reference implementation☆35Updated 5 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆83Updated 2 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 7 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆128Updated 2 years ago
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 3 years ago
- XPIR: Private Information Retrieval for Everyone☆118Updated 4 years ago
- mbedtls-SGX: a SGX-friendly TLS stack (ported from mbedtls)☆91Updated 6 years ago
- Secure auditing of Internet services with Intel SGX☆23Updated 4 years ago
- ☆184Updated 4 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆26Updated 6 years ago
- ☆28Updated 6 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆44Updated 8 years ago
- Query compiler for secure multi-party computation.☆100Updated 5 years ago
- ExitLess services for SGX enclaves☆34Updated 6 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Updated 8 years ago
- CUDA Homomorphic Encryption Library☆208Updated 8 years ago
- ☆49Updated last year
- code for privacy-preserving sat solver☆17Updated 2 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆28Updated last year
- ☆45Updated last year
- An encrypted data analytics platform☆185Updated 2 years ago
- 6.857 project - implementation of scheme for encrypting integer vectors that allows addition, linear transformation, and weighted inner p…☆70Updated 8 years ago
- Example on how to use the Intel SGX implementation of AES-GCM☆29Updated 6 years ago
- Library for performing Function Secret Sharing (FSS)☆94Updated 7 years ago