jgharehchamani / Small-Client-SSE
☆6Updated 3 years ago
Alternatives and similar repositories for Small-Client-SSE:
Users that are interested in Small-Client-SSE are comparing it to the libraries listed below
- ☆22Updated 5 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 3 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆24Updated last year
- ☆28Updated last year
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- ☆18Updated 2 months ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago
- ☆25Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆18Updated 2 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- Piranha: A GPU Platform for Secure Computation☆94Updated 2 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 9 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- ☆104Updated 3 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆21Updated 2 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆24Updated 11 months ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆163Updated last year
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Example implementation of the SealPIR protocol☆143Updated 4 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆95Updated 3 years ago
- Library for performing Function Secret Sharing (FSS)☆88Updated 6 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆82Updated 3 years ago
- DPF and PIR based on DPF in C++☆18Updated 4 years ago
- ☆67Updated 6 years ago