obliviousram / PathORAMLinks
Path ORAM reference implementation
☆28Updated 4 years ago
Alternatives and similar repositories for PathORAM
Users that are interested in PathORAM are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆21Updated 6 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 2 years ago
- Open-source library for ORAM implementations☆11Updated 5 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated 10 months ago
- ☆30Updated last year
- Piranha: A GPU Platform for Secure Computation☆94Updated 2 years ago
- A high-throughput oblivious storage system☆26Updated 2 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- ☆36Updated 4 years ago
- Symmetric Partial Homomorphic Encryption☆11Updated 4 years ago
- Optimizing compiler for Fully Homomorphic Encryption (FHE)☆74Updated 10 months ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆78Updated 2 years ago
- Open source implementation of TaoStore☆8Updated 4 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆25Updated last year
- ☆25Updated 5 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆57Updated 4 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆82Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- ☆34Updated last year
- ☆105Updated 3 years ago
- ☆67Updated 6 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆18Updated 2 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆33Updated 4 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆21Updated 3 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 2 years ago
- Number Theoretic Transform Implementation on GPU for FHE Applications☆40Updated 4 years ago
- A reading list for homomorphic encryption☆123Updated 10 months ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆28Updated 4 years ago