Vectorized Batch PIR implementation
☆13Jun 22, 2023Updated 2 years ago
Alternatives and similar repositories for vectorized_batchpir
Users that are interested in vectorized_batchpir are comparing it to the libraries listed below
Sorting:
- ☆21Jun 17, 2022Updated 3 years ago
- Constant-weight PIR using Constant-weight Equality Operators☆23May 5, 2022Updated 3 years ago
- Private Set Union☆16Oct 24, 2022Updated 3 years ago
- ☆32Sep 30, 2025Updated 5 months ago
- APSI is a C++ library for Asymmetric (unlabeled or labeled) Private Set Intersection.☆209Dec 30, 2023Updated 2 years ago
- ☆11Feb 9, 2016Updated 10 years ago
- ☆10Mar 4, 2024Updated last year
- AutoHotKey script that utilize your (probably) useless CapsLock as Magic Fn, available for pretty much every keyborard.☆10Jun 30, 2022Updated 3 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- Source code of "Deep Rank Hashing Network for Cancellable Face Identification"☆12Jul 8, 2022Updated 3 years ago
- Running massive simulations using RNNs on CPUs for building bots and all kinds of things.☆13Jun 13, 2021Updated 4 years ago
- ☆11Aug 20, 2024Updated last year
- ☆11May 28, 2024Updated last year
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆13Updated this week
- A repository for code used in the paper "On the precision loss in approximate homomorphic encryption"☆10Jan 16, 2025Updated last year
- Repository for Interoperability of FATE☆12Dec 31, 2025Updated 2 months ago
- ☆10Nov 1, 2024Updated last year
- Cell-Level RSRP Estimation with the Image-to-Image Wireless Propagation Model Based on Measured data.☆13Oct 10, 2023Updated 2 years ago
- The application is a end-user training and evaluation system for standard knowledge graph embedding models. It was developed to optimise …☆18May 30, 2025Updated 9 months ago
- Near-Optimal Oblivious Key-Value Stores☆14Nov 27, 2023Updated 2 years ago
- An addon that automates rolling for items for vanilla WoW.☆17Feb 27, 2025Updated last year
- Open source project implementing BLS remote signer in the Nordic nrf9160 and nrf5340 ARM Cortex-M33 based SoCs☆12Oct 8, 2024Updated last year
- ☆11Apr 2, 2024Updated last year
- SecretFlow-Serving is a serving system for privacy-preserving machine learning models.☆15Jan 22, 2026Updated last month
- Implementation of the Findex searchable encryption scheme☆17Feb 17, 2026Updated last week
- Multi-Server PIR (CCSW'14)☆11Dec 2, 2020Updated 5 years ago
- The Linux Foundation/Redwood EDA "Building a RISC-V CPU" Course content, also available via EdX.☆16Jul 9, 2024Updated last year
- A portable simplest oblivious transfer library.☆15Mar 30, 2025Updated 11 months ago
- ☆10May 27, 2024Updated last year
- A simple, Python-based, command-line runner for MGIZA++.☆10Mar 24, 2022Updated 3 years ago
- Incremental Offline/Online PIR☆14Apr 4, 2024Updated last year
- C++ implementation of VSS using LWE encryption and proofs☆15Oct 18, 2021Updated 4 years ago
- ☆13Nov 2, 2022Updated 3 years ago
- Standalone rendezvous server: https://github.com/libp2p/specs/blob/master/rendezvous/README.md☆17Mar 13, 2023Updated 2 years ago
- Dalamud chinese client injector☆12Jul 10, 2021Updated 4 years ago
- ☆16Dec 6, 2020Updated 5 years ago
- EmojiCrypt: Prompt Encryption for Secure Communication with Large Language Models☆23Feb 21, 2024Updated 2 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- ☆17Mar 3, 2024Updated last year