obliviousram / PathORAMLinks
Path ORAM reference implementation
☆35Updated 5 years ago
Alternatives and similar repositories for PathORAM
Users that are interested in PathORAM are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆61Updated 2 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆83Updated 2 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆26Updated 6 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 3 years ago
- ☆26Updated 6 years ago
- A Cryptographic Inference Service for Neural Networks☆131Updated last year
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆28Updated last year
- A high-throughput oblivious storage system☆28Updated 2 years ago
- Piranha: A GPU Platform for Secure Computation☆104Updated 2 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆171Updated 2 years ago
- ☆37Updated 5 years ago
- ☆110Updated 4 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆78Updated last year
- Optimizing compiler for Fully Homomorphic Encryption (FHE)☆79Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Updated 4 years ago
- Homomorphic matrix computation☆43Updated 6 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Updated 2 months ago
- Number Theoretic Transform Implementation on GPU for FHE Applications☆44Updated 4 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆59Updated 5 years ago
- Intel HEXL library backend for OpenFHE, which uses AVX-512 instructions to accelerate the execution of OpenFHE cryptographic capabilities…☆18Updated 4 months ago
- A reading list for homomorphic encryption☆134Updated 2 months ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆24Updated 7 years ago
- Example implementation of the SealPIR protocol☆156Updated last year
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆127Updated 2 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Updated 5 years ago
- ☆45Updated last year
- ☆32Updated 2 years ago
- ☆240Updated 2 months ago
- GPU implementation of BFV, CKKS and BGV homomorphic encryption schemes.☆41Updated last year