jgharehchamani / SSELinks
☆25Updated 6 years ago
Alternatives and similar repositories for SSE
Users that are interested in SSE are comparing it to the libraries listed below
Sorting:
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Updated 4 years ago
- ☆7Updated 3 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆79Updated 11 months ago
- ☆223Updated 5 months ago
- LaTeX package for typesetting pseudocode and cryptographic games☆177Updated last year
- Path ORAM reference implementation☆29Updated 4 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆172Updated 10 months ago
- ☆182Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆132Updated 4 months ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- ☆30Updated 2 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆76Updated last year
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Multi-party Private Set Union☆18Updated 5 months ago
- Example implementation of the SealPIR protocol☆151Updated 7 months ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- C++ OT extension implementation☆129Updated 4 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆27Updated last year
- ☆105Updated 3 years ago
- A repository for private set intersection.☆183Updated 6 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- Implementations of Private Set Intersection Protocols☆183Updated 2 weeks ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆38Updated 4 years ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆480Updated 3 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 2 years ago
- Library for performing Function Secret Sharing (FSS)☆91Updated 6 years ago