pps-lab / zeph-artifactLinks
Cryptographic Enforcement of End-to-End Data Privacy
☆26Updated 2 years ago
Alternatives and similar repositories for zeph-artifact
Users that are interested in zeph-artifact are comparing it to the libraries listed below
Sorting:
- A Cryptographic Inference Service for Neural Networks☆130Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆28Updated 5 years ago
- ☆106Updated 3 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆86Updated 4 years ago
- Piranha: A GPU Platform for Secure Computation☆98Updated 2 years ago
- ☆30Updated 2 years ago
- Homomorphic matrix computation☆43Updated 6 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆58Updated 2 years ago
- Query compiler for secure multi-party computation.☆99Updated 5 years ago
- ☆67Updated 6 years ago
- Library for performing Function Secret Sharing (FSS)☆93Updated 6 years ago
- ☆25Updated 3 years ago
- Example implementation of the SealPIR protocol☆152Updated 9 months ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆35Updated 3 years ago
- ☆228Updated 6 months ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆81Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆175Updated 2 weeks ago
- Path ORAM reference implementation☆30Updated 5 years ago
- Implementation of protocols in SecureNN.☆131Updated 2 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆77Updated last year
- Secure Aggregation for FL☆35Updated last year
- ☆182Updated 4 years ago
- Symmetric Partial Homomorphic Encryption☆13Updated 4 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆25Updated 2 years ago
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆483Updated 3 years ago
- Implementations of Private Set Intersection Protocols☆185Updated 2 months ago
- ☆19Updated 5 years ago