Client/Server framework for encrypted machine learning using homomorphic encryption
☆43Oct 1, 2021Updated 4 years ago
Alternatives and similar repositories for encrypted-evaluation
Users that are interested in encrypted-evaluation are comparing it to the libraries listed below
Sorting:
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆22Apr 28, 2025Updated 10 months ago
- Yet another simple kernel☆12Jun 12, 2018Updated 7 years ago
- writeups for Capture The Flag Competitions☆16May 31, 2022Updated 3 years ago
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆83Jul 23, 2024Updated last year
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆49Feb 3, 2021Updated 5 years ago
- A library for doing homomorphic encryption operations on tensors☆1,006Feb 27, 2026Updated 3 weeks ago
- Collection of my dotfiles of divers applications and configs☆12Nov 14, 2025Updated 4 months ago
- A curated list of awesome things and projects built by ESI-SBA students☆42Feb 8, 2021Updated 5 years ago
- Python modules which provide a suite of useful utilities for CTFs☆11Nov 1, 2019Updated 6 years ago
- Implementation of a Neural Network that predicts encrypted handwritten digits from the MNIST dataset. Encryption and Network Implemented …☆12Mar 10, 2019Updated 7 years ago
- This project studied homomorphic encryption and attempted to apply it in training machine learning models. We trained some models on plai…☆13Aug 23, 2022Updated 3 years ago
- Code for Paper "Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption"☆34Nov 17, 2022Updated 3 years ago
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆35Nov 8, 2021Updated 4 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- ☆17Sep 14, 2021Updated 4 years ago
- CryptoNets using Python and ctypes. This repository is part of the final project of Neural Networks at Sapienza University of Rome.☆24Oct 9, 2019Updated 6 years ago
- ☆30Jun 2, 2022Updated 3 years ago
- Differential privacy implementation in the Java family of languages (Java, Kotlin, Scala etc...)☆11Aug 31, 2020Updated 5 years ago
- This repo contains code/learning resources related to Homomorphic Encryption.☆27Oct 12, 2019Updated 6 years ago
- Fork of the differential privacy module of TF/models/research☆14Oct 9, 2019Updated 6 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- Challenges of the alpha ctf 2022☆13Jan 4, 2024Updated 2 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆56Jul 24, 2023Updated 2 years ago
- Medical data is often highly sensitive in terms of data privacy and security concerns. Federated learning, one type of machine learn- ing…☆23Jun 9, 2022Updated 3 years ago
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Oct 28, 2021Updated 4 years ago
- Trusted execution experiments with Intel SGX☆11Jun 17, 2020Updated 5 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- A multi-language library for translating commands between PyTorch, TensorFlow, and TensorFlow.js☆56Nov 21, 2022Updated 3 years ago
- Spark Time Series Set data analysis☆12Dec 14, 2020Updated 5 years ago
- SysX☆36Mar 27, 2024Updated last year
- An attempt to make a plugin to integrate snipe-it and osTicket☆11Apr 20, 2021Updated 4 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Jun 25, 2020Updated 5 years ago
- protostar docker version☆14Dec 23, 2020Updated 5 years ago
- ☆15Nov 8, 2019Updated 6 years ago
- ☆15Jul 26, 2021Updated 4 years ago
- 3D NFT Gallery Art☆13Sep 26, 2021Updated 4 years ago
- Malicious PowerShell Dataset☆26Aug 8, 2023Updated 2 years ago
- ☆16Sep 10, 2023Updated 2 years ago
- In this repository , you find my implementations for some classical cryptography algorithms and their vulnerabilities using python and …☆13Feb 8, 2023Updated 3 years ago