Secure Aggregation for Federated Learning with Malicious Actors
☆26Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for elsa
Users that are interested in elsa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Feb 3, 2026Updated 3 months ago
- ☆35Dec 23, 2025Updated 4 months ago
- ☆27Mar 24, 2023Updated 3 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Jun 27, 2023Updated 2 years ago
- ☆12Sep 12, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Secure aggregation protocol for TensorFlow Federated☆24Aug 19, 2020Updated 5 years ago
- Function-Dependent Preprocessing in MOTION☆14Nov 27, 2023Updated 2 years ago
- An implementation of Secure Aggregation algorithm based on "Practical Secure Aggregation for Privacy-Preserving Machine Learning (Bonawit…☆93Aug 4, 2019Updated 6 years ago
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- Compression primitives for uplink compression in Federated Learning that are compatible with Secure Aggregation.☆10Jul 27, 2022Updated 3 years ago
- Secure Aggregation for FL☆38Nov 25, 2023Updated 2 years ago
- An awesome & curated list of anything that might be useful for computer science students☆13Mar 27, 2023Updated 3 years ago
- Secure Computation Library☆16Aug 28, 2017Updated 8 years ago
- A simple Python implementation of a secure aggregation protocole for federated learning.☆38May 1, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- personal implementation of secure aggregation protocol☆44Feb 6, 2024Updated 2 years ago
- This code uses federated learning to forecast electrical power consumption of households while protecting data privacy.☆12Mar 9, 2024Updated 2 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆63Jan 29, 2018Updated 8 years ago
- Cryptographically Secure Aggregation for Federated Learning☆11Jan 24, 2023Updated 3 years ago
- An implementation of Oblivious RAM☆38Feb 12, 2025Updated last year
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆34Jun 10, 2021Updated 4 years ago
- An implementation of the 'DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More' protocol.☆42Mar 19, 2026Updated last month
- MPC Secure Multiparty Computation. A three-party secret-sharing-based vertical federated learning setting. The data are vertically parti…☆24Jul 1, 2019Updated 6 years ago
- Source code for MLSys 2022 submission "LightSecAgg: a Lightweight and Versatile Design for Secure Aggregation in Federated Learning"☆29Oct 25, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆24Mar 27, 2026Updated last month
- ☆241Mar 12, 2026Updated last month
- Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization☆13Jun 21, 2021Updated 4 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆493Apr 23, 2026Updated last week
- Python3 implementation of Bulletproofs - non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup…☆28Dec 8, 2022Updated 3 years ago
- ☆40Nov 8, 2024Updated last year
- MCSI☆13Nov 2, 2021Updated 4 years ago
- ☆18Dec 19, 2025Updated 4 months ago
- Learning how to bulletproofs☆40Dec 22, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Single & Multi Key Homomorphic Encryption Library☆19Jun 14, 2022Updated 3 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- SecretFlow-Serving is a serving system for privacy-preserving machine learning models.☆16Jan 22, 2026Updated 3 months ago
- A page containing many useful links.☆26Sep 6, 2024Updated last year
- The code of paper "High-order Correlation Preserved Incomplete Multi-view Subspace Clustering" accepted by IEEE TIP2022☆12Jan 19, 2022Updated 4 years ago
- The source code of the paper "Efficient Privacy-Preserving Federated Learning with Compressed Sensing"☆22May 23, 2024Updated last year
- ☆11Jan 17, 2023Updated 3 years ago