☆36Oct 26, 2020Updated 5 years ago
Alternatives and similar repositories for dory
Users that are interested in dory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Prototype of a system for metadata-hiding communication for whistleblowers☆20Feb 6, 2020Updated 6 years ago
- ☆32Jul 12, 2023Updated 2 years ago
- An Implementation of Incremental Distributed Point Functions in C++☆80Jan 5, 2026Updated 3 months ago
- A framework for deploying on-demand distributed-trust.☆14Jun 4, 2024Updated last year
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆10Apr 22, 2018Updated 7 years ago
- ☆22Mar 27, 2026Updated 2 weeks ago
- Open-source library for ORAM implementations☆11Apr 15, 2020Updated 5 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Jun 16, 2021Updated 4 years ago
- Library for performing Function Secret Sharing (FSS)☆96Nov 15, 2018Updated 7 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆56Jul 24, 2023Updated 2 years ago
- A Three Party MPC framework for Machine learning and Databases☆213Feb 27, 2026Updated last month
- Recursive unified ORAM☆15Sep 23, 2015Updated 10 years ago
- Global-Scale Secure Multiparty Computation☆50Nov 13, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A high-throughput oblivious storage system☆28May 31, 2023Updated 2 years ago
- A decentralized privacy-preserving data sharing tool☆31Oct 11, 2021Updated 4 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆64Jan 29, 2018Updated 8 years ago
- egg graphql plugin☆10Apr 12, 2022Updated 4 years ago
- tweet sentiment extraction of kaggle competition☆12Jul 2, 2020Updated 5 years ago
- Order-revealing encryption library used by the CipherStash searchable encryption platform.☆28Jun 7, 2024Updated last year
- Official implementation of FOCAS: Practical Video Super Resolution using Foveated Rendering☆12Apr 4, 2023Updated 3 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆14Apr 2, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆43Aug 16, 2018Updated 7 years ago
- Cerebro: A platform for Secure Coopetitive Learning☆24Sep 9, 2021Updated 4 years ago
- A GIS powered study to check whether China is to blame for the air pollution in South Korea.☆12Sep 8, 2019Updated 6 years ago
- ☆14Aug 14, 2024Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆38May 2, 2022Updated 3 years ago
- ☆12Nov 4, 2022Updated 3 years ago
- ☆12May 22, 2023Updated 2 years ago
- Parallel implementation of Graph Convolutional Networks on CPU☆17Jul 3, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15May 16, 2017Updated 8 years ago
- ☆23May 25, 2021Updated 4 years ago
- Decentralized and trustless Monero block explorer☆31Nov 23, 2022Updated 3 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Sep 27, 2022Updated 3 years ago
- Pung: a fully untrusted private communication system☆35May 15, 2020Updated 5 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago