stephentu / monomi-optimizer
Monomi designer and planner prototype
☆14Updated 10 years ago
Alternatives and similar repositories for monomi-optimizer:
Users that are interested in monomi-optimizer are comparing it to the libraries listed below
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- The compiler for ObliVM☆65Updated 4 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- ☆28Updated 5 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- Example implementation of the SealPIR protocol☆141Updated 3 months ago
- ☆23Updated 3 years ago
- ☆28Updated last year
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- Implementation of Oblivious Dynamic Searchable Encryption Framework☆8Updated 7 years ago
- Library for performing Function Secret Sharing (FSS)☆88Updated 6 years ago
- ☆35Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆96Updated 3 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 8 months ago
- Global-Scale Secure Multiparty Computation☆43Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆168Updated 6 months ago
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- Implementations of Private Set Intersection Protocols☆178Updated 2 years ago
- ☆25Updated 4 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Updated 9 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆164Updated last year
- C++ OT extension implementation☆126Updated 4 years ago
- Private Information Retrieval protocol☆44Updated 3 years ago
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- 6.857 project - implementation of scheme for encrypting integer vectors that allows addition, linear transformation, and weighted inner p…☆70Updated 7 years ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 6 years ago
- StealthDB: an encrypted database from intel sgx with small trusted computing base.☆60Updated 3 years ago