pancake-security / pancake
System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.
☆21Updated 2 years ago
Alternatives and similar repositories for pancake:
Users that are interested in pancake are comparing it to the libraries listed below
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- ☆28Updated last year
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- ☆35Updated 4 years ago
- ☆178Updated 3 years ago
- Library for performing Function Secret Sharing (FSS)☆88Updated 6 years ago
- Symmetric Partial Homomorphic Encryption☆10Updated 4 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- ☆22Updated 5 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- POSUP: Oblivious Search and Update Platform with SGX (PETS'19)☆14Updated 5 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆39Updated 6 years ago
- ☆13Updated 7 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆12Updated 4 years ago
- Example implementation of the SealPIR protocol☆143Updated 4 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆95Updated 3 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- DPF and PIR based on DPF in C++☆18Updated 4 years ago
- Path ORAM reference implementation☆26Updated 4 years ago