stephentu / monomi-optimizer
Monomi designer and planner prototype
☆14Updated 10 years ago
Alternatives and similar repositories for monomi-optimizer:
Users that are interested in monomi-optimizer are comparing it to the libraries listed below
- The compiler for ObliVM☆65Updated 4 years ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 9 months ago
- Query compiler for secure multi-party computation.☆98Updated 4 years ago
- C++ OT extension implementation☆126Updated 4 years ago
- ☆28Updated 5 years ago
- Private Information Retrieval protocol☆44Updated 4 years ago
- ☆35Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆95Updated 3 years ago
- Example implementation of the SealPIR protocol☆143Updated 4 months ago
- ☆26Updated 4 years ago
- Library for performing Function Secret Sharing (FSS)☆88Updated 6 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- Implementation of Oblivious Dynamic Searchable Encryption Framework☆8Updated 7 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆120Updated last year
- ☆28Updated last year
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Updated 9 years ago
- Global-Scale Secure Multiparty Computation☆44Updated 2 years ago
- Secure Computation Library☆17Updated 7 years ago
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆183Updated last year
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- 6.857 project - implementation of scheme for encrypting integer vectors that allows addition, linear transformation, and weighted inner p…☆69Updated 7 years ago
- StealthDB: an encrypted database from intel sgx with small trusted computing base.☆60Updated 3 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆169Updated 7 months ago
- An Implementation of Order-Revealing Encryption☆93Updated 4 years ago