taostore / TaoStoreLinks
Open source implementation of TaoStore
☆8Updated 4 years ago
Alternatives and similar repositories for TaoStore
Users that are interested in TaoStore are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆57Updated 5 years ago
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Updated 4 years ago
- CMake file for using Intel SGX on Linux☆52Updated 3 years ago
- A relational Multi-Party Computation framework for analytics in untrusted clouds☆30Updated 10 months ago
- ExitLess services for SGX enclaves☆33Updated 5 years ago
- The nbench benchmark ported to SGX.☆13Updated 5 years ago
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆37Updated 2 years ago
- Example on how to use the Intel SGX implementation of AES-GCM☆28Updated 6 years ago
- A high-throughput oblivious storage system☆26Updated 2 years ago
- Path ORAM reference implementation☆29Updated 4 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆165Updated 2 years ago
- ☆19Updated 5 years ago
- Secure auditing of Internet services with Intel SGX☆22Updated 4 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- A curated list of open-source projects that help exploit Intel SGX technology☆399Updated last month
- SGX从入门到放弃☆350Updated 3 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 2 years ago
- ☆56Updated last year
- ☆10Updated 5 years ago
- ☆14Updated 3 years ago
- ☆49Updated last year
- ☆60Updated last year
- ☆18Updated 2 years ago
- ☆16Updated 3 years ago
- ☆30Updated 2 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Updated 7 years ago
- paper collections in database/distributed system/operating system/crypto/arch/security&privacy☆82Updated 3 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆27Updated last year