sumonbis / PathORAMLinks
Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the access pattern. Oblivious RAM is the way to hide the memory access pattern with some extra bandwidth and memory overhead.
☆25Updated 6 years ago
Alternatives and similar repositories for PathORAM
Users that are interested in PathORAM are comparing it to the libraries listed below
Sorting:
- Path ORAM reference implementation☆35Updated 5 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Updated 4 years ago
- Homomorphic Logistic Regression on Encrypted Data☆51Updated 6 years ago
- Cheddar: A Swift Fully Homomorphic Encryption (FHE) GPU Library☆41Updated 4 months ago
- Optimizing compiler for Fully Homomorphic Encryption (FHE)☆79Updated last year
- A unified testbed for evaluating different Oblivious RAM☆61Updated 2 years ago
- ☆31Updated 2 years ago
- A high-throughput oblivious storage system☆28Updated 2 years ago
- Number Theoretic Transform Implementation on GPU for FHE Applications☆44Updated 4 years ago
- ☆13Updated 7 years ago
- This is code for homomorphic encryption scheme "a Full RNS variant of HEAAN"☆60Updated 7 years ago
- A reading list for homomorphic encryption☆134Updated last month
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆127Updated 2 years ago
- Intel HEXL library backend for OpenFHE, which uses AVX-512 instructions to accelerate the execution of OpenFHE cryptographic capabilities…☆18Updated 3 months ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆83Updated 2 years ago
- ☆20Updated 7 years ago
- Homomorphic matrix computation☆43Updated 6 years ago
- ANT-ACE: Advanced Compiler Ecosystem for Fully Homomorphic Encryption and Domain Specific Computing☆51Updated last month
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Updated 4 years ago
- code for privacy-preserving sat solver☆17Updated 2 years ago
- ☆67Updated 7 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆24Updated 7 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆29Updated last year
- ☆40Updated last year
- ☆106Updated last year
- POC implementation of "Accelerating HE Operations Using Key Decomposition"[KLSS23]☆18Updated 6 months ago
- Python-based Oblivious RAM☆29Updated 6 years ago
- Implementation of deep ResNet model on CKKS scheme in Microsoft SEAL library using multiplexed parallel convolution☆100Updated 3 years ago
- An easy-to-use tensor compiler for FHE☆29Updated 10 months ago
- ☆43Updated last year