Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser
☆37Oct 12, 2017Updated 8 years ago
Alternatives and similar repositories for ciphermed
Users that are interested in ciphermed are comparing it to the libraries listed below
Sorting:
- Fast binary matrix product on CPU☆10Feb 11, 2016Updated 10 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- ☆11Dec 14, 2016Updated 9 years ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Nov 10, 2016Updated 9 years ago
- an implementation of CryptoNets☆11Aug 22, 2018Updated 7 years ago
- python script implementation of residual network of identity mapping☆15Apr 1, 2016Updated 9 years ago
- Random collection of zero-knowledge stuff☆15May 20, 2018Updated 7 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- Go bindings for my shamir-secret-sharing library☆18Dec 3, 2021Updated 4 years ago
- Deep Reinforcement Learning with Fined Grained Action Repetition☆22Jan 8, 2018Updated 8 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆44Feb 12, 2017Updated 9 years ago
- ☆15Mar 7, 2014Updated 11 years ago
- Implementation of the Paillier homomorphic cryptosystem using GMP☆29May 18, 2022Updated 3 years ago
- Automated Deployment of Lab Environments System (ADLES)☆31Mar 25, 2021Updated 4 years ago
- This repo was mirrored from here: https://bitbucket.org/aquariusjay/deeplab-public-ver2☆26Nov 29, 2016Updated 9 years ago
- Submission site for 2018Q2 Zcash Foundation grant proposals.☆26Apr 27, 2018Updated 7 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Jul 3, 2017Updated 8 years ago
- 6.857 project - implementation of scheme for encrypting integer vectors that allows addition, linear transformation, and weighted inner p…☆70Jun 26, 2017Updated 8 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Dec 19, 2019Updated 6 years ago
- A FRamework for Efficient Secure COmputation☆140Mar 6, 2025Updated 11 months ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Dec 26, 2018Updated 7 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆35Jun 10, 2021Updated 4 years ago
- A Secure Multiparty Computation (MPC) protocol for computing linear regression on vertically distributed datasets.☆32Apr 16, 2019Updated 6 years ago
- Annotation de la jurisprudence des CA Fr☆12May 4, 2018Updated 7 years ago
- Modeling and simulation of ICS devices☆12Jan 28, 2026Updated last month
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- ☆12Sep 22, 2015Updated 10 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- ☆11Oct 10, 2017Updated 8 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- CS 294-144 Blockchain, Cryptoeconomics, and the Future of Technology, Business and Law (Spring 2018)☆10Apr 25, 2018Updated 7 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- Implementation of a simple linear regression algorithm in MAMBA☆10Feb 12, 2020Updated 6 years ago
- ☆10Mar 4, 2024Updated last year
- Caffe: a Fast framework for deep learning. Custom version with built-in sparse inputs, segmentation, object detection, class weights, and…☆35Sep 29, 2023Updated 2 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆43Aug 2, 2019Updated 6 years ago