wfus / Fully-Homomorphic-Image-ProcessingLinks
Fully Homomorphic Image Preprocessing and analysis - JPEG encoding, decoding, image resizing.
☆53Updated 7 years ago
Alternatives and similar repositories for Fully-Homomorphic-Image-Processing
Users that are interested in Fully-Homomorphic-Image-Processing are comparing it to the libraries listed below
Sorting:
- Private Information Retrieval protocol☆45Updated 4 years ago
- Bridge between TensorFlow and the Microsoft SEAL homomorphic encryption library☆95Updated 6 years ago
- Privacy -preserving Neural Networks☆79Updated 7 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆83Updated 2 years ago
- A Cryptographic Inference Service for Neural Networks☆131Updated last year
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆127Updated 2 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆57Updated 2 years ago
- nGraph-HE: Deep learning with Homomorphic Encryption (HE) through Intel nGraph☆174Updated 3 years ago
- Compiler for the SEAL homomorphic encryption library☆257Updated last year
- CUDA-accelerated Fully Homomorphic Encryption Library☆237Updated 4 years ago
- A SMPC companion library for Syft☆106Updated 2 weeks ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆98Updated 3 years ago
- SHEEP is a Homomorphic Encryption Evaluation Platform☆52Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Updated 2 months ago
- Example implementation of the SealPIR protocol☆156Updated last year
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆62Updated 9 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆183Updated 2 months ago
- ☆441Updated last year
- CUDA Homomorphic Encryption Library☆207Updated 8 years ago
- A repo to hold common tools used by my crypto projects☆133Updated 4 months ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago
- Private Set Intersection Cardinality protocol based on ECDH and Bloom Filters☆148Updated last month
- ☆24Updated 6 years ago
- ☆67Updated 7 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆78Updated last year
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆91Updated 2 years ago
- Repository for the SCALE-MAMBA MPC system☆264Updated 2 years ago
- ☆45Updated last year
- ☆110Updated 4 years ago
- Homomorphic matrix computation☆43Updated 6 years ago