☆26Apr 1, 2025Updated last year
Alternatives and similar repositories for ypir
Users that are interested in ypir are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Mar 27, 2026Updated last month
- ☆15Mar 19, 2026Updated last month
- Fast, High-Rate Single-Server PIR via FHE Composition☆38May 2, 2022Updated 4 years ago
- The implementation of Tiptoe's linearly-homomorphic encryption scheme, accompanying the paper "Private Web Search with Tiptoe" (SOSP 2023…☆22Sep 22, 2023Updated 2 years ago
- ☆15Sep 1, 2025Updated 8 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆100Jan 13, 2023Updated 3 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆28Mar 10, 2024Updated 2 years ago
- Private Information Retrieval protocol☆46Apr 3, 2021Updated 5 years ago
- Multi-GPU acceleration for Fully Homomorphic Encryption☆23Jun 3, 2024Updated last year
- ☆18May 23, 2024Updated last year
- ☆20Jul 1, 2024Updated last year
- Lattices and Their Algorithms, Leiden, Spring 2024☆23Aug 13, 2024Updated last year
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation (IEEE S&P 2024)☆18Nov 12, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Example implementation of the SealPIR protocol☆156Nov 19, 2024Updated last year
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- ☆114Jul 4, 2024Updated last year
- ☆21Jun 17, 2022Updated 3 years ago
- ☆12May 22, 2023Updated 2 years ago
- A cross compiler and standardized benchmarks for fully homomorphic encryption☆39Dec 29, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A deep learning library for C/C++☆10May 17, 2013Updated 12 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- ☆15Apr 18, 2024Updated 2 years ago
- Constant-weight PIR using Constant-weight Equality Operators☆23May 5, 2022Updated 4 years ago
- ☆11Oct 25, 2023Updated 2 years ago
- HEonGPU is a high-performance library that optimizes Fully Homomorphic Encryption (FHE) on GPUs. Leveraging GPU parallelism, it reduces c…☆125Apr 14, 2026Updated 3 weeks ago
- Cheddar: A Swift Fully Homomorphic Encryption (FHE) GPU Library☆80Apr 9, 2026Updated 3 weeks ago
- ☆33Sep 22, 2023Updated 2 years ago
- ☆16Mar 3, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Anonymous Credit Tokens implementation in Rust☆27Mar 2, 2026Updated 2 months ago
- A Rust implementation of the Lamport one-time signature scheme☆15Nov 30, 2022Updated 3 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Jan 27, 2015Updated 11 years ago
- The monorepo for Meson project☆12May 30, 2024Updated last year
- Implements an encryptable machine (shapeCPU Java)☆11Aug 26, 2015Updated 10 years ago
- The source codes of TDv2 in paper: TDv2: A Novel Tree-Structured Decoder for Offline Mathematical Expression Recognition.☆12Jul 28, 2022Updated 3 years ago