Secure Computation Library
☆17Aug 28, 2017Updated 8 years ago
Alternatives and similar repositories for SeComLib
Users that are interested in SeComLib are comparing it to the libraries listed below
Sorting:
- ☆37Jun 28, 2013Updated 12 years ago
- Privacy-preserving k-means clustering on data owned by multiple parties☆14May 10, 2016Updated 9 years ago
- ☆24Dec 2, 2019Updated 6 years ago
- Realizing private and practical pharmacological collaboration☆15Oct 19, 2018Updated 7 years ago
- ☆184Jun 21, 2021Updated 4 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Dec 6, 2022Updated 3 years ago
- Secure Interrogation of Genomic Databases (SIG-DB) using Homomorphic Encryption☆10May 16, 2018Updated 7 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 3 years ago
- An Efficient Learning Framework For Federated XGBoostUsing Secret Sharing And Distributed Optimization☆32Mar 8, 2025Updated last year
- ☆11May 17, 2021Updated 4 years ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆58Sep 14, 2025Updated 6 months ago
- SKNNS (Secure K-Nearest Neighbor Scheme) model is a secure scheme for implementing a whole structure of the privacy preserving k-NN algor…☆11Apr 9, 2017Updated 8 years ago
- ☆12Apr 10, 2020Updated 5 years ago
- Secure Aggregation for FL☆38Nov 25, 2023Updated 2 years ago
- Liveness monitoring daemon for periodic jobs☆12Apr 13, 2024Updated last year
- PyHeal is a Python wrapper for Microsoft SEAL aimed at making operations easier to use.☆15Apr 23, 2020Updated 5 years ago
- A Merkle tree, implemented in Golang☆15Aug 21, 2018Updated 7 years ago
- DEDIS Ledger Architecture☆20Feb 13, 2026Updated last month
- ☆18Jan 4, 2021Updated 5 years ago
- An asynchronous Rust client and server implementation of the Network Block Device (NBD) protocol. MIT Licensed.☆11Jan 24, 2022Updated 4 years ago
- 微信机器人抓取并分发招聘信息☆25Mar 16, 2017Updated 9 years ago
- [ICML 2019] ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation☆54Oct 29, 2025Updated 4 months ago
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 3 years ago
- Privacy-Preserving Dynamic Learning of Tor Network Traffic☆10Jun 15, 2021Updated 4 years ago
- Elasticsearch interface for go☆21Mar 26, 2012Updated 13 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Sep 5, 2020Updated 5 years ago
- 使用flask、mysql、C3.js搭建的基于互联网岗位需求的分析报告。☆20Mar 30, 2017Updated 8 years ago
- Implementation of protocols in SecureNN.☆131Oct 8, 2022Updated 3 years ago
- Automated Cryptographic Transformations☆28Aug 23, 2021Updated 4 years ago
- ☆24Sep 16, 2016Updated 9 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆104Sep 22, 2023Updated 2 years ago
- Homomorphic Encryption in Python☆20Jan 28, 2018Updated 8 years ago
- A implementation of Privacy Buckets: A numerical tool to calculate privacy loss☆11May 19, 2022Updated 3 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆35Jun 10, 2021Updated 4 years ago
- Provider library - a library of small helpers. These may or may not become part of OpenSSL at some point☆12May 15, 2025Updated 10 months ago
- ☆12Oct 19, 2020Updated 5 years ago
- Intel HEXL library backend for OpenFHE, which uses AVX-512 instructions to accelerate the execution of OpenFHE cryptographic capabilities…☆18Mar 12, 2026Updated last week
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago