google / prochloLinks
☆34Updated 5 years ago
Alternatives and similar repositories for prochlo
Users that are interested in prochlo are comparing it to the libraries listed below
Sorting:
- XPIR: Private Information Retrieval for Everyone☆119Updated 4 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 7 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆64Updated 7 years ago
- ☆28Updated 6 years ago
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 5 years ago
- The compiler for ObliVM☆65Updated 5 years ago
- Library for performing Function Secret Sharing (FSS)☆94Updated 7 years ago
- ☆126Updated this week
- An Oblivious General-Purpose SQL Database for the Cloud☆59Updated 5 years ago
- An Implementation of Incremental Distributed Point Functions in C++☆81Updated 2 weeks ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆28Updated 2 years ago
- A unified testbed for evaluating different Oblivious RAM☆61Updated 2 years ago
- ☆23Updated 4 years ago
- ☆13Updated 7 years ago
- Query compiler for secure multi-party computation.☆100Updated 5 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆127Updated 2 years ago
- ☆49Updated last year
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆91Updated 3 years ago
- Python-based Oblivious RAM☆29Updated 6 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆109Updated 3 years ago
- ☆38Updated 3 years ago
- ☆44Updated last year
- Implementation of SoftSpokenOT. Forked from libOTe.☆10Updated last year
- A collection of algorithms that can do join between two parties while preserving the privacy of keys on which the join happens☆213Updated last year
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆171Updated 2 years ago
- HAL: A Library for Homomorphic Authentication☆22Updated 8 years ago
- ☆184Updated 4 years ago
- Intel® Software Guard Extensions SSL☆239Updated last month
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆37Updated 8 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆62Updated 9 years ago