Implementation of S3ORAM (CCS'17 & ACM TOPS'20)
☆19Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for S3ORAM
Users that are interested in S3ORAM are comparing it to the libraries listed below
Sorting:
- A Concretely Efficient Hierarchical Oblivious RAM☆13Nov 6, 2023Updated 2 years ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Feb 11, 2020Updated 6 years ago
- POSUP: Oblivious Search and Update Platform with SGX (PETS'19)☆13Feb 11, 2020Updated 6 years ago
- Efficient Dynamic Proof of Retrievability☆16Feb 12, 2024Updated 2 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆26Mar 17, 2019Updated 6 years ago
- ☆10Apr 22, 2018Updated 7 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Implementation of the new multilinear maps over the integers☆10Feb 12, 2019Updated 7 years ago
- Open-source library for ORAM implementations☆11Apr 15, 2020Updated 5 years ago
- ☆12Mar 25, 2020Updated 5 years ago
- Lightweight Cryptographic Framework for Internet of Drones☆17Sep 29, 2018Updated 7 years ago
- A unified testbed for evaluating different Oblivious RAM☆61May 4, 2023Updated 2 years ago
- ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline☆19Jul 14, 2023Updated 2 years ago
- Hardware implementation of ORAM☆24Jul 12, 2017Updated 8 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- Some lightweight cryptography algorithms optimized for x86☆22Oct 27, 2022Updated 3 years ago
- ☆26Nov 16, 2023Updated 2 years ago
- ☆22Jun 20, 2024Updated last year
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- ☆27Sep 12, 2016Updated 9 years ago
- An address component tagger based on statistical natural language processing techniques☆11Apr 17, 2014Updated 11 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Mar 13, 2020Updated 5 years ago
- Path ORAM reference implementation☆35Jul 25, 2020Updated 5 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆37Nov 9, 2025Updated 3 months ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- C++ iterator that performs the cartesian product of many containers.☆12Jan 12, 2016Updated 10 years ago
- Privacy-Preserving Dynamic Learning of Tor Network Traffic☆10Jun 15, 2021Updated 4 years ago
- A POC for a mutual fund listing app with a user signup/signin flow that displays multiple mutual funds in a scrollable list. Certain esse…☆10Feb 1, 2023Updated 3 years ago
- ☆10Mar 4, 2024Updated 2 years ago
- CCS Tools☆13Sep 4, 2023Updated 2 years ago
- (包含完整代码和坑点记录)Student version of Assignment 1 for Stanford CS336 - Language Modeling From Scratch☆27Jan 22, 2026Updated last month
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆12Sep 4, 2024Updated last year
- ☆12Oct 15, 2016Updated 9 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Oct 29, 2022Updated 3 years ago
- Implementation of Nova using arkworks for learning purposes. https://eprint.iacr.org/2021/370.pdf☆45May 31, 2023Updated 2 years ago