samee / sqrtOram
☆13Updated 6 years ago
Alternatives and similar repositories for sqrtOram:
Users that are interested in sqrtOram are comparing it to the libraries listed below
- ☆28Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- ☆178Updated 3 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆78Updated last year
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- ☆103Updated 3 years ago
- ☆10Updated 4 years ago
- Python-based Oblivious RAM☆29Updated 5 years ago
- Library for performing Function Secret Sharing (FSS)☆88Updated 6 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆61Updated 8 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆163Updated last year
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆119Updated last year
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- HAL: A Library for Homomorphic Authentication☆19Updated 7 years ago
- A generic Secure Computation API for garbled circuits, SPDZ, etc.☆21Updated last year
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆21Updated 11 months ago
- XPIR: Private Information Retrieval for Everyone☆116Updated 3 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- ☆67Updated 6 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆15Updated 3 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- Private Information Retrieval protocol☆44Updated 3 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- DPF and PIR based on DPF in C++☆17Updated 3 years ago