#
confidential-computing
Here are 33 public repositories matching this topic...
Apache Teaclave (incubating) is an open source universal secure computing platform, making computation on privacy-sensitive data safe and simple.
rust
faas
sgx
trustzone
tee
function-as-a-service
trusted-execution-environment
universal-secure-computing
secure-multiparty-computation
confidential-computing
-
Updated
Dec 15, 2021 - Rust
A novel container runtime, aka confidential container, for cloud-native confidential computing and enclave runtime ecosystem.
kubernetes
cloud
runtime
containers
container
oci
cloud-native
sgx
enclave
tee
sgx-enclave
intel-sgx
oci-runtime
confidential-computing
confidential-container
trusted-applications
-
Updated
Dec 8, 2021 - C
Versatile framework for multi-party computation
mpc
secret-sharing
secure-computation
threshold-cryptography
privacy-enhancing-technologies
garbled-circuits
multi-party-computation
multiparty-computation
secure-multi-party-computation
secure-multiparty-computation
confidential-computing
-
Updated
Dec 15, 2021 - C++
EGo is an open-source SDK that enables you to develop your own confidential apps in the Go programming language.
-
Updated
Dec 6, 2021 - Go
MarbleRun is the control plane for confidential computing. Deploy, scale, and verify your confidential microservices on vanilla Kubernetes. 100% Go, 100% cloud native, 100% confidential.
kubernetes
golang
distributed-systems
microservice
sgx
enclave
service-mesh
intel-sgx
confidential-computing
confidential-microservices
-
Updated
Dec 13, 2021 - Go
Teaclave TrustZone SDK enables safe, functional, and ergonomic development of trustlets.
-
Updated
Nov 24, 2021 - Rust
dreemkiller
commented
Jan 22, 2021
Describe the bug
The SGX enclave entry functions for Sonora are not easily discoverable
To Reproduce
Try grepping for sinaloa_init_remote_attestation_enc in the project directory. You will find calls to it but not an implementation
Expected behaviour
To aide newcomers to the project, functions should be easy for them to find the implementations of.
Additional context
Edgeless RT is an SDK and a runtime for Intel SGX. It combines top-notch Go support with simplicity, robustness and a small TCB. Developing confidential microservices has never been easier! C++17 and Rust (experimental) are also supported.
rust
golang
sgx
enclave
intel-sgx
trusted-execution-environment
confidential-computing
confidential-microservices
-
Updated
Dec 8, 2021 - C++
Enarx.dev website and relevant assets
-
Updated
Dec 14, 2021 - JavaScript
The free EAP version of the Cosmian Collaborative Confidential Computing platform. Try it!
-
Updated
Jun 29, 2021
A confidential variant of Linkerd's emojivoto demo application. Your emoji votes have never been more secure!
-
Updated
Nov 8, 2021 - Go
Trusted execution experiments with Intel SGX
python
security
intel
pytorch
secure
graphene
experiments
confidentiality
sgx
tee
secure-computation
intel-sgx
trusted-execution-environment
confidential-computing
-
Updated
Jun 17, 2020 - Makefile
Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment
-
Updated
Dec 14, 2020 - C
An end-to-end demonstration of a Confidential Web App running on an AMD powered Confidential VM with Azure SQL, AKV mHSM and Azure Confidential Ledger.
-
Updated
May 24, 2021 - CSS
Confidential Computing Zoo provides confidential computing solutions based on Intel SGX, TDX, HEXL, etc. technologies.
-
Updated
Dec 14, 2021 - Python
A complete workshop content with a series of tracks and hands-on labs on various techniques to protect data in use.
encryption
homomorphic-encryption
differential-privacy
multiparty-computation
confidential-computing
-
Updated
Sep 10, 2020 - PowerShell
CipherCompute: A more elaborated version of Yao's millionaire problem. Secret compute of KPIs
-
Updated
Jul 12, 2021 - Rust
Development Docker image for the Veracruz privacy-preserving compute project. Veracruz is an adopted project of the Confidential Compute Consortium (CCC).
-
Updated
Nov 30, 2021 - Rust
Privacy preserving machine learning demo using TensorFlow, running as an sgx-enclave with Gramine, orchestrated by MarbleRun
-
Updated
Nov 8, 2021 - Python
CipherCompute: Blind Join for Confidential Data Science and Federated Learning using MPC
-
Updated
Jul 21, 2021 - Rust
Demo application to showcase interaction of EdgelessDB and MarbleRun
-
Updated
Nov 8, 2021 - Go
Edgeless Systems' helm charts
-
Updated
Nov 8, 2021
Cubbit Vault is advanced online file encryption and decryption tool that helps users to encrypt files on the client-side, making it less vulnerable in the internet space and decreasing its chances of getting viewed by a third party.
-
Updated
May 3, 2021 - JavaScript
CareKit is an open source framework that helps users better understand and manage their health by creating dynamic care plans, tracking symptoms, connecting to care teams, and more. CareKit itself doesn’t include a back end, so it’s up to the developers to include a back end of their choice. This typically means implementing the synchronization API for their cloud provider of choice. IBM was one of the first cloud providers to implement the synchronization API, and consumed the Hyper Protect set of offerings to provide a HIPAA-ready back end.
-
Updated
Apr 27, 2021
A repository of larger example Veracruz computations
privacy-enhancing-technologies
sel4
intel-sgx
arm-trustzone
confidential-computing
nitro-enclaves
veracruz
-
Updated
Dec 2, 2021 - C
Outreachy Internship Journey Documentation
-
Updated
Dec 15, 2021 - JavaScript
The Veracruz project homepage. Veracruz is an adopted project of the Confidential Compute Consortium (CCC).
-
Updated
May 11, 2021
Improve this page
Add a description, image, and links to the confidential-computing topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the confidential-computing topic, visit your repo's landing page and select "manage topics."
As described in #275, please help me with the documentation of SGX SDK:
/documents/directory/documents/directoryThis documents will be rendered in our homepage (https://teaclave.apache.org/sgx-sdk-docs/). Thank you so much!