Vectorized Batch PIR implementation
☆12Jun 22, 2023Updated 2 years ago
Alternatives and similar repositories for vectorized_batchpir
Users that are interested in vectorized_batchpir are comparing it to the libraries listed below
Sorting:
- Constant-weight PIR using Constant-weight Equality Operators☆23May 5, 2022Updated 3 years ago
- ☆21Jun 17, 2022Updated 3 years ago
- Private Set Union☆15Oct 24, 2022Updated 3 years ago
- ☆32Sep 30, 2025Updated 5 months ago
- Source code of "Deep Rank Hashing Network for Cancellable Face Identification"☆12Jul 8, 2022Updated 3 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆16May 5, 2022Updated 3 years ago
- APSI is a C++ library for Asymmetric (unlabeled or labeled) Private Set Intersection.☆208Dec 30, 2023Updated 2 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆13Feb 25, 2026Updated 3 weeks ago
- Near-Optimal Oblivious Key-Value Stores☆13Nov 27, 2023Updated 2 years ago
- An addon that automates rolling for items for vanilla WoW.☆17Feb 27, 2025Updated last year
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Sep 25, 2024Updated last year
- AutoHotKey script that utilize your (probably) useless CapsLock as Magic Fn, available for pretty much every keyborard.☆10Jun 30, 2022Updated 3 years ago
- ☆11Aug 20, 2024Updated last year
- ☆10Mar 4, 2024Updated 2 years ago
- ☆10May 27, 2024Updated last year
- ☆11Feb 9, 2016Updated 10 years ago
- ☆17Mar 3, 2024Updated 2 years ago
- Multi-Server PIR (CCSW'14)☆11Dec 2, 2020Updated 5 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- Python implementation of the Fully Homomorphic Encryption Scheme TFHE☆17Jun 19, 2023Updated 2 years ago
- Privacy-Preserving Gradient Boosting Decision Trees (AAAI 2020)☆28Oct 6, 2023Updated 2 years ago
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆17Mar 10, 2023Updated 3 years ago
- Implementation of the Findex searchable encryption scheme☆17Mar 13, 2026Updated last week
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- ☆11Apr 2, 2024Updated last year
- ☆11May 28, 2024Updated last year
- Python wrapper for labeled and unlabeled asymmetric private set intersection (APSI).☆17Apr 12, 2024Updated last year
- Standalone rendezvous server: https://github.com/libp2p/specs/blob/master/rendezvous/README.md☆17Mar 13, 2023Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Mar 12, 2026Updated last week
- A repository for code used in the paper "On the precision loss in approximate homomorphic encryption"☆11Jan 16, 2025Updated last year
- Python library that serves as an API for common cryptographic primitives used to implement OPRF, OT, and PSI protocols.☆28May 8, 2024Updated last year
- Decentralised Voting Scheme☆16Dec 5, 2021Updated 4 years ago
- Open source project implementing BLS remote signer in the Nordic nrf9160 and nrf5340 ARM Cortex-M33 based SoCs☆13Oct 8, 2024Updated last year
- C++ implementation of VSS using LWE encryption and proofs☆15Oct 18, 2021Updated 4 years ago
- Official codes of the paper: Deep Center-Based Dual-Constrained Hashing for Discriminative Face Image Retrieval (DCDH)☆29Jun 14, 2024Updated last year
- Incremental Offline/Online PIR☆14Apr 4, 2024Updated last year
- The Linux Foundation/Redwood EDA "Building a RISC-V CPU" Course content, also available via EdX.☆16Jul 9, 2024Updated last year
- Dalamud chinese client injector☆12Jul 10, 2021Updated 4 years ago
- ☆10Nov 1, 2024Updated last year