☆36Oct 26, 2020Updated 5 years ago
Alternatives and similar repositories for dory
Users that are interested in dory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Prototype of a system for metadata-hiding communication for whistleblowers☆20Feb 6, 2020Updated 6 years ago
- ☆32Jul 12, 2023Updated 2 years ago
- An Implementation of Incremental Distributed Point Functions in C++☆79Jan 5, 2026Updated 2 months ago
- A framework for deploying on-demand distributed-trust.☆14Jun 4, 2024Updated last year
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- ☆10Apr 22, 2018Updated 7 years ago
- ☆22May 14, 2024Updated last year
- Example on how to use the Intel SGX implementation of AES-GCM☆29Mar 13, 2019Updated 7 years ago
- Open-source library for ORAM implementations☆11Apr 15, 2020Updated 5 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- Library for performing Function Secret Sharing (FSS)☆95Nov 15, 2018Updated 7 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆56Jul 24, 2023Updated 2 years ago
- A Three Party MPC framework for Machine learning and Databases☆212Feb 27, 2026Updated 3 weeks ago
- Recursive unified ORAM☆15Sep 23, 2015Updated 10 years ago
- A high-throughput oblivious storage system☆28May 31, 2023Updated 2 years ago
- A decentralized privacy-preserving data sharing tool☆31Oct 11, 2021Updated 4 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆64Jan 29, 2018Updated 8 years ago
- egg graphql plugin☆10Apr 12, 2022Updated 3 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Dec 19, 2019Updated 6 years ago
- tweet sentiment extraction of kaggle competition☆12Jul 2, 2020Updated 5 years ago
- ☆12Aug 6, 2023Updated 2 years ago
- Order-revealing encryption library used by the CipherStash searchable encryption platform.☆28Jun 7, 2024Updated last year
- ☆25Dec 21, 2018Updated 7 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆14Apr 2, 2021Updated 4 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- Cerebro: A platform for Secure Coopetitive Learning☆24Sep 9, 2021Updated 4 years ago
- A GIS powered study to check whether China is to blame for the air pollution in South Korea.☆12Sep 8, 2019Updated 6 years ago
- ☆14Aug 14, 2024Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆38May 2, 2022Updated 3 years ago
- ☆12Nov 4, 2022Updated 3 years ago
- ☆12May 22, 2023Updated 2 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15May 16, 2017Updated 8 years ago
- ☆23May 25, 2021Updated 4 years ago
- Pung: a fully untrusted private communication system☆35May 15, 2020Updated 5 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- An Implementation of Order-Revealing Encryption☆101Aug 31, 2020Updated 5 years ago
- MCSI☆13Nov 2, 2021Updated 4 years ago
- A 2-round lattice-based threshold signature from standard assumptions☆17Apr 11, 2025Updated 11 months ago