☆36Oct 26, 2020Updated 5 years ago
Alternatives and similar repositories for dory
Users that are interested in dory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Implementation of Incremental Distributed Point Functions in C++☆81Jan 5, 2026Updated 3 months ago
- A framework for deploying on-demand distributed-trust.☆14Jun 4, 2024Updated last year
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- ☆10Apr 22, 2018Updated 8 years ago
- ☆24Mar 27, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Example on how to use the Intel SGX implementation of AES-GCM☆29Mar 13, 2019Updated 7 years ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆52Jul 14, 2021Updated 4 years ago
- Open-source library for ORAM implementations☆11Apr 15, 2020Updated 6 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Jun 16, 2021Updated 4 years ago
- Library for performing Function Secret Sharing (FSS)☆95Nov 15, 2018Updated 7 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆56Jul 24, 2023Updated 2 years ago
- Recursive unified ORAM☆16Sep 23, 2015Updated 10 years ago
- Global-Scale Secure Multiparty Computation☆51Nov 13, 2025Updated 5 months ago
- A decentralized privacy-preserving data sharing tool☆31Oct 11, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A high-throughput oblivious storage system☆28May 31, 2023Updated 2 years ago
- egg graphql plugin☆10Apr 12, 2022Updated 4 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆63Jan 29, 2018Updated 8 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Dec 19, 2019Updated 6 years ago
- tweet sentiment extraction of kaggle competition☆12Jul 2, 2020Updated 5 years ago
- Order-revealing encryption library used by the CipherStash searchable encryption platform.☆28Apr 22, 2026Updated last week
- Official implementation of FOCAS: Practical Video Super Resolution using Foveated Rendering☆12Apr 4, 2023Updated 3 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆14Apr 2, 2021Updated 5 years ago
- Tabby - a vertical tmux tab manager with tab groups, themes and cats!☆37Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Aug 16, 2018Updated 7 years ago
- Cerebro: A platform for Secure Coopetitive Learning☆24Sep 9, 2021Updated 4 years ago
- A GIS powered study to check whether China is to blame for the air pollution in South Korea.☆12Sep 8, 2019Updated 6 years ago
- ☆12Nov 4, 2022Updated 3 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆38May 2, 2022Updated 4 years ago
- ☆12May 22, 2023Updated 2 years ago
- Parallel implementation of Graph Convolutional Networks on CPU☆17Jul 3, 2019Updated 6 years ago
- Whisp - Environmental Sound Classifier☆13Aug 14, 2023Updated 2 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15May 16, 2017Updated 8 years ago
- ☆23May 25, 2021Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Sep 27, 2022Updated 3 years ago
- Pung: a fully untrusted private communication system☆35May 15, 2020Updated 5 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- 2019华为软件精英挑战赛☆10Apr 15, 2019Updated 7 years ago
- An Implementation of Order-Revealing Encryption☆101Aug 31, 2020Updated 5 years ago