ucbrise / waldo
☆28Updated last year
Alternatives and similar repositories for waldo:
Users that are interested in waldo are comparing it to the libraries listed below
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆82Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- ☆104Updated 3 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- ☆67Updated 6 years ago
- ☆25Updated 2 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- FLUTE: Fast and Secure Lookup Table Evaluations☆24Updated last year
- A Cryptographic Inference Service for Neural Networks☆130Updated 8 months ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆29Updated 5 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Private Information Retrieval protocol☆44Updated 4 years ago
- Secure Aggregation for FL☆34Updated last year
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- Implementation of protocols in SecureNN.☆129Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆125Updated last month
- Secure Aggregation for Federated Learning with Malicious Actors☆24Updated 2 years ago
- ☆30Updated 2 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 4 months ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆24Updated last year
- ☆34Updated 4 years ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Updated 3 years ago
- ☆36Updated 5 months ago
- Library for performing Function Secret Sharing (FSS)☆89Updated 6 years ago