ucbrise / snoopy
A high-throughput oblivious storage system
☆23Updated last year
Related projects ⓘ
Alternatives and complementary repositories for snoopy
- ☆33Updated 4 years ago
- ☆25Updated last year
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆17Updated 5 years ago
- Path Oblivious Heap C++ Reference Implementation☆22Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- ☆26Updated last year
- Path ORAM reference implementation☆23Updated 4 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- CMake file for using Intel SGX on Linux☆50Updated 3 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆26Updated last year
- ExitLess services for SGX enclaves☆33Updated 5 years ago
- ☆58Updated 8 months ago
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆37Updated 2 years ago
- Global-Scale Secure Multiparty Computation☆40Updated last year
- Secure auditing of Internet services with Intel SGX☆22Updated 3 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆31Updated 3 years ago
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Updated 3 years ago
- MAGE: Memory-Aware Garbling Engine☆26Updated 3 months ago
- A relational Multi-Party Computation framework for analytics in untrusted clouds☆24Updated 3 months ago
- Query compiler for secure multi-party computation.☆98Updated 4 years ago
- Deep Learning with Intel SGX☆21Updated 5 years ago
- Private Information Retrieval protocol☆42Updated 3 years ago
- ☆22Updated 3 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆161Updated last year
- A two-party secure function evaluation using Yao's garbled circuit protocol☆73Updated 5 months ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆74Updated last year
- A Cryptographic Inference Service for Neural Networks☆125Updated 3 months ago