privateLLM001 / Private-LLM-InferenceLinks
☆15Updated 2 years ago
Alternatives and similar repositories for Private-LLM-Inference
Users that are interested in Private-LLM-Inference are comparing it to the libraries listed below
Sorting:
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- Piranha: A GPU Platform for Secure Computation☆103Updated 2 years ago
- Private Inference on Transformer☆30Updated 2 years ago
- Materials about Privacy-Preserving Machine Learning☆262Updated 3 months ago
- ☆110Updated 4 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated 2 years ago
- ☆38Updated 2 years ago
- The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆50Updated 10 months ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆19Updated 5 years ago
- Privacy-Preserving, Accurate and Efficient Inference for Transformers☆33Updated last year
- A framework for secure, handy, accurate, and fast transformer inference☆21Updated 4 months ago
- A Cryptographic Inference Service for Neural Networks☆130Updated last year
- ☆213Updated 10 months ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated last week
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆11Updated 2 years ago
- Implementation of protocols in Falcon☆95Updated last year
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆90Updated this week
- ☆38Updated last year
- MPC team of Security Group in HITSZ☆19Updated this week
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Updated 3 years ago
- Repository for collection of research papers on multi-party learning.☆34Updated 2 years ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago
- ☆129Updated 4 months ago
- ☆67Updated 7 years ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆30Updated 10 months ago
- ☆18Updated 3 years ago
- GPU implementation of BFV, CKKS and BGV homomorphic encryption schemes.☆41Updated last year