oblivm / ObliVMLangLinks
The compiler for ObliVM
☆65Updated 4 years ago
Alternatives and similar repositories for ObliVMLang
Users that are interested in ObliVMLang are comparing it to the libraries listed below
Sorting:
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 7 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆121Updated last year
- ☆28Updated 5 years ago
- ☆180Updated 4 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- XPIR: Private Information Retrieval for Everyone☆118Updated 3 years ago
- Library for performing Function Secret Sharing (FSS)☆90Updated 6 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 6 years ago
- Example implementation of the SealPIR protocol☆151Updated 7 months ago
- Implementation of Brakerski's leveled homomorphic encryption system☆43Updated 8 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆185Updated last year
- CUDA Homomorphic Encryption Library☆201Updated 8 years ago
- Implementations of Private Set Intersection Protocols☆181Updated 2 years ago
- A FRamework for Efficient Secure COmputation☆140Updated 3 months ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 2 years ago
- C++ OT extension implementation☆127Updated 4 years ago
- ☆37Updated 11 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆61Updated 8 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆172Updated 9 months ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆129Updated 9 years ago
- Global-Scale Secure Multiparty Computation☆46Updated 2 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- 6.857 project - implementation of scheme for encrypting integer vectors that allows addition, linear transformation, and weighted inner p…☆69Updated 7 years ago
- ☆222Updated 4 months ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago