Bridge between TensorFlow and Google's Private Join and Compute library
☆16Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for tf-pjc
Users that are interested in tf-pjc are comparing it to the libraries listed below
Sorting:
- Arbitrary precision integers in TensorFlow☆11Dec 27, 2022Updated 3 years ago
- Secure aggregation protocol for TensorFlow Federated☆24Aug 19, 2020Updated 5 years ago
- The website for TF Encrypted☆13Jan 5, 2023Updated 3 years ago
- TensorFlow World 2019 Tutorial: Privacy-Preserving Machine Learning with TF Encrypted & PySyft☆45May 16, 2023Updated 2 years ago
- Bridge between TensorFlow and the Microsoft SEAL homomorphic encryption library☆95Jan 22, 2020Updated 6 years ago
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Jul 23, 2020Updated 5 years ago
- SOON TO BE DEPRECATED - The TensorFlow bindings for PySyft☆56May 30, 2020Updated 5 years ago
- Cape Privacy CLI☆30May 2, 2023Updated 2 years ago
- The Hybrid Public Key Encryption (HPKE) standard in Python☆12Apr 29, 2024Updated last year
- Benchmark and comparison of secure Deep Learning platforms: TF Privacy, PySyft and TF-Encrypted☆10Mar 31, 2021Updated 4 years ago
- Collateral Learning - Functional Encryption and Adversarial Training on partially encrypted networks☆77Jul 25, 2024Updated last year
- Implementing use-based privacy for ubiquitous computing.☆18Jun 26, 2025Updated 8 months ago
- Verify every install script. Checksum.sh is a simple way to download, review, and verify install scripts.☆43Feb 14, 2023Updated 3 years ago
- Sample functions for Cape Privacy☆20Sep 8, 2023Updated 2 years ago
- ☆21Apr 29, 2024Updated last year
- Paillier Homomorphic Addition Public Key Cryptosystem☆18Dec 5, 2020Updated 5 years ago
- Implementation of protocols in SecureNN.☆131Oct 8, 2022Updated 3 years ago
- The Cape Privacy JavaScript SDK☆24Dec 1, 2025Updated 3 months ago
- Secure distributed dataflow framework for encrypted machine learning and data processing☆70Mar 20, 2024Updated last year
- An implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.☆23Aug 6, 2018Updated 7 years ago
- A collection of algorithms that can do join between two parties while preserving the privacy of keys on which the join happens☆213Oct 18, 2024Updated last year
- Tasks that allow students to learn the basics of image processing, esp Fingerprint processing.☆10Jan 21, 2025Updated last year
- ☆11Feb 18, 2026Updated last week
- A cross-platform CLI tool to resize clipboard images on the fly☆41May 18, 2023Updated 2 years ago
- Privacy -preserving Neural Networks☆79Dec 21, 2018Updated 7 years ago
- Cryptris, a game about asymmetric cryptography☆18Sep 6, 2014Updated 11 years ago
- Online Recruitment System☆12Mar 31, 2018Updated 7 years ago
- A re-implementation of the Cuphead expert mode with all-new content☆12Nov 11, 2024Updated last year
- ☆13Nov 5, 2024Updated last year
- ☆11Oct 27, 2021Updated 4 years ago
- ☆848Oct 20, 2025Updated 4 months ago
- A Julia implementation of the Paillier partially homomorphic encryption system☆12Oct 8, 2020Updated 5 years ago
- Private Set Union from Symmetric-Key Techniques☆11Jan 13, 2024Updated 2 years ago
- Maximize yields on assets across different AAVE markets☆12Feb 11, 2021Updated 5 years ago
- Quantum-proof, 768-bit signatures for 1-bit messages☆12Mar 11, 2020Updated 5 years ago
- ☆10Oct 22, 2021Updated 4 years ago
- Display your process vitals metrics☆10Sep 2, 2025Updated 6 months ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆17Apr 19, 2016Updated 9 years ago
- Python Library for Function Approximation in Machine Learning☆12Nov 5, 2019Updated 6 years ago