ucbrise / waldoLinks
☆29Updated last year
Alternatives and similar repositories for waldo
Users that are interested in waldo are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆82Updated 3 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- ☆37Updated 6 months ago
- A repo to hold common tools used by my crypto projects☆130Updated this week
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- ☆25Updated 2 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆12Updated 4 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Library for performing Function Secret Sharing (FSS)☆90Updated 6 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Private Decision Tree Evaluation protocols☆11Updated 4 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆29Updated 6 years ago
- ☆67Updated 6 years ago
- ☆105Updated 3 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 5 months ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Updated 3 years ago
- Private Information Retrieval protocol☆45Updated 4 years ago
- Secure Aggregation for FL☆35Updated last year
- Implementation of protocols in Falcon☆93Updated 10 months ago
- Benchmarks for various multi-party computation frameworks☆19Updated 7 months ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆25Updated last year
- ☆54Updated 3 years ago