haochenuw / algorithms-in-SEALLinks
Some algorithms for computation on encrypted data based on Microsoft SEAL
☆28Updated 5 years ago
Alternatives and similar repositories for algorithms-in-SEAL
Users that are interested in algorithms-in-SEAL are comparing it to the libraries listed below
Sorting:
- ☆67Updated 6 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- Homomorphic matrix computation☆43Updated 6 years ago
- ☆106Updated 3 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated last year
- Private AI Bootcamp was hosted by Microsoft in Redmond, WA on Dec 2nd-4th, 2019. This repository contains materials offered at the event,…☆33Updated 5 years ago
- ☆27Updated 6 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 3 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆19Updated 3 years ago
- ☆228Updated 6 months ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆175Updated last week
- Secure Logistic Regression based on Homomorphic Encryption☆44Updated 6 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆88Updated 2 years ago
- Implementation of protocols in Falcon☆95Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆86Updated 4 years ago
- My Final Year Project using Microsoft SEAL: Logistic Regression over Encrypted Data.☆32Updated 4 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆39Updated 4 years ago
- C++ OT extension implementation☆128Updated 4 years ago
- ☆182Updated 4 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆61Updated 9 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- Example implementation of the SealPIR protocol☆152Updated 9 months ago
- Implementation of protocols in SecureNN.☆131Updated 2 years ago
- ☆36Updated last year
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Updated 4 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆35Updated 3 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- A Three Party MPC framework for Machine learning and Databases☆211Updated 5 months ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago