obliviousram / PathORAM
Path ORAM reference implementation
☆23Updated 4 years ago
Alternatives and similar repositories for PathORAM:
Users that are interested in PathORAM are comparing it to the libraries listed below
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- ☆28Updated last year
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆18Updated 5 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- A Cryptographic Inference Service for Neural Networks☆126Updated 6 months ago
- A high-throughput oblivious storage system☆25Updated last year
- Open-source library for ORAM implementations☆11Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆77Updated last year
- ☆35Updated 4 years ago
- Piranha: A GPU Platform for Secure Computation☆91Updated last year
- ☆66Updated 6 years ago
- ☆216Updated 3 months ago
- ☆103Updated 3 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆163Updated last year
- ☆16Updated 2 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆79Updated 3 years ago
- ☆178Updated 3 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆21Updated 2 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- POSUP: Oblivious Search and Update Platform with SGX (PETS'19)☆14Updated 4 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 7 months ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- This is code for homomorphic encryption scheme "a Full RNS variant of HEAAN"☆49Updated 6 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆167Updated 5 months ago
- ☆10Updated 4 years ago