stephentu / monomi-optimizer
Monomi designer and planner prototype
☆14Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for monomi-optimizer
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- ☆28Updated 5 years ago
- The compiler for ObliVM☆64Updated 4 years ago
- Global-Scale Secure Multiparty Computation☆40Updated last year
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆94Updated 3 years ago
- ☆33Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆76Updated 2 years ago
- Example implementation of the SealPIR protocol☆140Updated this week
- Query compiler for secure multi-party computation.☆98Updated 4 years ago
- ☆22Updated 3 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆119Updated last year
- Private Information Retrieval protocol☆43Updated 3 years ago
- Library for performing Function Secret Sharing (FSS)☆85Updated 6 years ago
- Implementation of Oblivious Dynamic Searchable Encryption Framework☆8Updated 6 years ago
- ☆25Updated last year
- The garbled circuit backend for the ObliVM framework☆17Updated 8 years ago
- A Secure Multiparty Computation (MPC) protocol for computing linear regression on vertically distributed datasets.☆32Updated 5 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Updated 9 years ago
- C++ OT extension implementation☆125Updated 4 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆34Updated 2 years ago
- Privacy -preserving Neural Networks☆75Updated 5 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆94Updated last year
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆161Updated 3 months ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- Implementations of Private Set Intersection Protocols☆178Updated 2 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆73Updated 5 months ago
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 6 years ago