☆26Apr 1, 2025Updated last year
Alternatives and similar repositories for ypir
Users that are interested in ypir are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Mar 27, 2026Updated 2 weeks ago
- ☆15Mar 19, 2026Updated 3 weeks ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆38May 2, 2022Updated 3 years ago
- The implementation of Tiptoe's linearly-homomorphic encryption scheme, accompanying the paper "Private Web Search with Tiptoe" (SOSP 2023…☆22Sep 22, 2023Updated 2 years ago
- ☆15Sep 1, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆100Jan 13, 2023Updated 3 years ago
- The reference implementation of Tiptoe, accompanying the paper "Private web search with Tiptoe" (SOSP 2023).☆52Oct 1, 2023Updated 2 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆28Mar 10, 2024Updated 2 years ago
- Private Information Retrieval protocol☆45Apr 3, 2021Updated 5 years ago
- ☆17May 23, 2024Updated last year
- ☆21Jul 1, 2024Updated last year
- Lattices and Their Algorithms, Leiden, Spring 2024☆23Aug 13, 2024Updated last year
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation (IEEE S&P 2024)☆18Nov 12, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Jun 23, 2021Updated 4 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Example implementation of the SealPIR protocol☆156Nov 19, 2024Updated last year
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- ☆111Jul 4, 2024Updated last year
- ☆21Jun 17, 2022Updated 3 years ago
- ☆12May 22, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A cross compiler and standardized benchmarks for fully homomorphic encryption☆39Dec 29, 2023Updated 2 years ago
- A deep learning library for C/C++☆10May 17, 2013Updated 12 years ago
- ☆15Apr 18, 2024Updated last year
- Constant-weight PIR using Constant-weight Equality Operators☆23May 5, 2022Updated 3 years ago
- ☆11Oct 25, 2023Updated 2 years ago
- HEonGPU is a high-performance library that optimizes Fully Homomorphic Encryption (FHE) on GPUs. Leveraging GPU parallelism, it reduces c…☆124Feb 23, 2026Updated last month
- ☆33Sep 22, 2023Updated 2 years ago
- Cheddar: A Swift Fully Homomorphic Encryption (FHE) GPU Library☆75Mar 31, 2026Updated 2 weeks ago
- ☆16Mar 3, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Rust implementation of the Lamport one-time signature scheme☆15Nov 30, 2022Updated 3 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Jan 27, 2015Updated 11 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Implements an encryptable machine (shapeCPU Java)☆11Aug 26, 2015Updated 10 years ago
- The source codes of TDv2 in paper: TDv2: A Novel Tree-Structured Decoder for Offline Mathematical Expression Recognition.☆12Jul 28, 2022Updated 3 years ago
- PyTorch implementation of Fully Convolutional DenseNets for Semantic Segmentation☆10Jan 2, 2020Updated 6 years ago