huhushengwei5151 / MSM
MSM-优化
☆17Updated last month
Alternatives and similar repositories for MSM
Users that are interested in MSM are comparing it to the libraries listed below
Sorting:
- ☆18Updated last month
- ☆28Updated 2 months ago
- ☆64Updated 3 months ago
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆20Updated 2 years ago
- ☆33Updated last month
- Code repository for the paper at USENIX Security'24☆27Updated 9 months ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- ☆59Updated 5 months ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆50Updated this week
- ☆36Updated 6 months ago
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆27Updated 2 months ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆19Updated last year
- Secure Aggregation for Federated Learning with Malicious Actors☆25Updated 2 years ago
- Code release for MPCViT accepted by ICCV 2023☆15Updated 4 months ago
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- Privacy-Preserving, Accurate and Efficient Inference for Transformers☆27Updated 11 months ago
- Private Inference on Transformer☆24Updated last year
- MPC team of Security Group in HITSZ☆20Updated 3 weeks ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 9 months ago
- ☆52Updated 5 months ago
- Privacy preserving vertical federated learning for tree-based models☆27Updated 3 years ago
- Implementation of protocols in Falcon☆93Updated 9 months ago
- ☆16Updated 7 months ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆32Updated 4 years ago
- ☆37Updated 3 months ago
- Experimental Code for Private Decision Tree Evaluation☆12Updated last year
- ☆32Updated last year
- List of papers on cryptography assisted deep learning privacy computation☆12Updated 3 weeks ago
- A mathematical and code introduction to the BFV Homomorphic Encryption scheme.☆38Updated 2 years ago