zhouzhangwalker / HE3DB
☆33Updated last year
Alternatives and similar repositories for HE3DB:
Users that are interested in HE3DB are comparing it to the libraries listed below
- Implementation of deep ResNet model on CKKS scheme in Microsoft SEAL library using multiplexed parallel convolution☆78Updated 2 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- ☆32Updated last month
- ☆104Updated 3 years ago
- PhantomFHE: A CUDA-Accelerated Homomorphic Encryption Library☆102Updated 2 months ago
- GPU implementation of BFV, CKKS and BGV homomorphic encryption schemes.☆36Updated 9 months ago
- ☆67Updated 6 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆17Updated 2 years ago
- Public source code for Optimized Privacy-Preserving CNN Inference with Fully Homomorphic Encryption☆36Updated 2 years ago
- HEonGPU is a high-performance library that optimizes Fully Homomorphic Encryption (FHE) on GPUs. Leveraging GPU parallelism, it reduces c…☆52Updated 2 weeks ago
- Multi-party Private Set Union☆16Updated last month
- Experimental Code for Private Decision Tree Evaluation☆12Updated last year
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Official implementation for AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE. The paper is presented at the 33rd USE…☆18Updated 3 months ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- ☆27Updated 6 years ago
- Homomorphic matrix computation☆42Updated 5 years ago
- GPU/CUDA implementation of Leveled BFV/CKKS/BGV scheme.☆27Updated last week
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 3 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Updated 2 years ago
- Piranha: A GPU Platform for Secure Computation☆93Updated last year
- ☆30Updated last year
- Efficient Private Set Intersection base on VOLE☆125Updated last week
- Source code for the paper "Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption"☆45Updated last week
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Source code for the paper "Transformer-based Language Models and Homomorphic Encryption: an intersection with BERT-tiny"☆19Updated last week
- ☆22Updated 2 weeks ago
- ☆14Updated last year