☆28Sep 16, 2019Updated 6 years ago
Alternatives and similar repositories for GraphSC
Users that are interested in GraphSC are comparing it to the libraries listed below
Sorting:
- The garbled circuit backend for the ObliVM framework☆17Feb 11, 2016Updated 10 years ago
- A Flexible Efficient Secure Computation Backend☆33May 26, 2018Updated 7 years ago
- The compiler for ObliVM☆65Sep 1, 2020Updated 5 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆128Nov 14, 2023Updated 2 years ago
- Implementation of cryptographic program obfuscation☆42Feb 8, 2018Updated 8 years ago
- ☆12Nov 4, 2022Updated 3 years ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Nov 10, 2016Updated 9 years ago
- ☆11Mar 8, 2022Updated 4 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- ☆37Jun 28, 2013Updated 12 years ago
- ☆184Jun 21, 2021Updated 4 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Aug 12, 2015Updated 10 years ago
- Implementation of Distributed function secret sharing and applications☆15May 10, 2025Updated 10 months ago
- Official implementation of FOCAS: Practical Video Super Resolution using Foveated Rendering☆12Apr 4, 2023Updated 2 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆59Jun 30, 2020Updated 5 years ago
- A GIS powered study to check whether China is to blame for the air pollution in South Korea.☆12Sep 8, 2019Updated 6 years ago
- Toolbox for Automatic Secure Two-partY computation☆10May 6, 2016Updated 9 years ago
- ☆15Mar 7, 2014Updated 12 years ago
- ☆21Oct 10, 2015Updated 10 years ago
- Simple implementation of CoveringLSH☆10Jan 22, 2016Updated 10 years ago
- Obsolete Github repo for the tiqr.org project. Note that the repository is split into several individual repos, all with a tiqr- prefix☆35Jul 2, 2022Updated 3 years ago
- Blind Justice Code for the paper "Blind Justice: Fairness with Encrypted Sensitive Attributes", ICML 2018☆14Mar 20, 2019Updated 7 years ago
- Ghost port of the open-source jekyll theme, dbyll.☆16Aug 14, 2014Updated 11 years ago
- ☆10Apr 22, 2018Updated 7 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- Generic anonymous routing protocol framework agnostic to encryption algorithm and transport layer☆15Jun 16, 2018Updated 7 years ago
- DFC: High performance string pattern matching☆30Mar 8, 2021Updated 5 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14May 23, 2018Updated 7 years ago
- ☆21Jun 13, 2017Updated 8 years ago
- Website for Security and Privacy of Machine Learning☆14Dec 27, 2021Updated 4 years ago
- proof of individuality☆25Oct 1, 2015Updated 10 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- An encrypted data analytics platform☆187Mar 29, 2023Updated 2 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆172Mar 25, 2023Updated 2 years ago
- Reduced on-disk Suffix Array☆22Oct 9, 2013Updated 12 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆443Jun 19, 2024Updated last year
- ☆15Apr 6, 2016Updated 9 years ago
- ☆12Jan 8, 2016Updated 10 years ago