Navigating Homomorphic Encryption through Gates and Lookup Tables. HELM is a framework for evaluating synthesizable HDL designs in the encrypted domain that is designed for multi-core CPU evaluation. Users can choose between evaluating circuits composed of standard Boolean gates, low-precision LUTs, or high-precision arithmetic operations. In all cases, both sequential and combinational circuits are supported with the exception of arithmetic circuits (which only support combinational logic).
Private, Lightweight Aggregated Statistics against Malicious Adversaries.
Private Matching for Compute, or Private-ID, is a collection of algorithms to match records between two or more parties, while preserving the privacy of these records.
T2: A cross compiler and standardized benchmarks for FHE computation.
T2 is an extensible cross compiler and standardized benchmark suite enabling comparisons between fully-homomorphic encryption (FHE) libraries. The T2 repository comprises the T2 DSL and the T2 compiler from T2 DSL to state-of-the-art FHE back-ends. T2 aims to offer a standardized benchmark suite for FHE that encompasses realistic use-cases. Additionally, the T2 compiler offers a great starting point to explore the different backends (e.g., HElib, Lattigo, PALISADE, SEAL, and TFHE) as a single T2 program is transpiled to all supported FHE libraries.
liboqs-java: Java wrapper for liboqs.
liboqs is an open source C library for quantum-resistant cryptographic algorithms. See more about liboqs at openquantumsafe.org.
CSAW 2022 Embedded Security Challenge (ESC).
ESC'2022 focused on machine learning-based attacks in both edge and cloud computing. Machine learning cloud services are used by millions of users every day, and special care needs to be taken to ensure trained models are protected from malicious users. In ESC'2022, teams investigated a range of attacks (such as model leakage) on the machine learning models hosted on a cloud server using a remote Raspberry Pi virtual device.
CSAW 2021 Embedded Security Challenge (ESC).
ESC is an educational, research-oriented tournament
aimed at hacking into the hardware of embedded systems.
ESC'2021 focused on side channel attacks (SCAs) and fault
injection attacks (FIAs), which can be employed to
exfiltrate private information from hardware.
CSAW 2020 Embedded Security Challenge (ESC).
ESC'2020 focused on the security of Internet of
Things (IoT) where contestants were tasked to hack the firmware of
a wifi access point running on a RISC-V IoT platform.
A Framework for Deploying Transparent Zero Knowledge Proofs
ZeroJava to zMIPS compiler.
A compiler to translate ZeroJava code to zMIPS assembly and create zero-knowledge proofs using the Zilch framework.
Source code for "Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case" A. Giannopoulos, D. Mouris M.Sc. thesis for the National and Kapodistrian University of Athens.
See more about liboqs at mhmd.madgik.di.uoa.gr.
Data-oblivious benchmarks for encrypted data computation.
Create QR codes to secret share a message using Shamir's secret sharing algorithm. Ideal for cryptocurrency wallet recovery keys, passwords, etc. Protect your message by sharing it to secrets. Print the created QR codes and store them separately somewhere safe.
FFS: Fourier Fingerprint Search.
Advanced search of 3D CAD files in the Fourier domain.
An e-commerce marketplace template. An online auction and shopping website for buying and selling a wide variety of goods and services worldwide.
An image-filtering project optimized with parallel programming techniques (MPI, MPI & OpenMP, and CUDA).