samee / sqrtOramLinks
☆13Updated 7 years ago
Alternatives and similar repositories for sqrtOram
Users that are interested in sqrtOram are comparing it to the libraries listed below
Sorting:
- ☆180Updated 3 years ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 3 years ago
- ☆30Updated last year
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆120Updated last year
- Library for performing Function Secret Sharing (FSS)☆90Updated 6 years ago
- ☆10Updated 5 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆43Updated 8 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆78Updated 2 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 2 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆61Updated 8 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆28Updated 4 years ago
- Python-based Oblivious RAM☆29Updated 5 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Updated 4 years ago
- DPF and PIR based on DPF in C++☆19Updated 4 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆21Updated 3 years ago
- Symmetric Partial Homomorphic Encryption☆11Updated 4 years ago
- Private Information Retrieval protocol☆45Updated 4 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆27Updated last year
- ☆67Updated 6 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆172Updated 9 months ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆75Updated 11 months ago
- C++ OT extension implementation☆127Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- A Cryptographic Inference Service for Neural Networks☆130Updated 10 months ago