EncKV: An Encrypted Key-value Store with Rich Queries
☆11Oct 10, 2017Updated 8 years ago
Alternatives and similar repositories for ASIACCS-17
Users that are interested in ASIACCS-17 are comparing it to the libraries listed below
Sorting:
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- An Implementation of Order-Revealing Encryption☆100Aug 31, 2020Updated 5 years ago
- DPF and PIR based on DPF in C++☆20Mar 4, 2021Updated 4 years ago
- ☆21Oct 10, 2015Updated 10 years ago
- A tool for secret-shared passphrases.☆14Jan 17, 2022Updated 4 years ago
- OCaml parsers for multiple key formats☆15Aug 1, 2024Updated last year
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆10Oct 10, 2017Updated 8 years ago
- ☆10May 2, 2022Updated 3 years ago
- ☆11Mar 8, 2022Updated 3 years ago
- Utility to benchmark speed of operations of a PKCS#11 implementation.☆13Updated this week
- ☆11Nov 21, 2022Updated 3 years ago
- A set of cryptographic proofs for simple protocols, to be formalised in various tools.☆21Dec 3, 2025Updated 2 months ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- A Dockerfile for building the TLA+ tools☆13Dec 30, 2018Updated 7 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- CLI utilty to work out proper constants for vpternlogic instruction☆13Jan 22, 2023Updated 3 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Kitbag is a content-addressed versioned tree-structured graph-based datastore.☆14Aug 6, 2021Updated 4 years ago
- RAINS (Another Internet Naming Service)☆10Feb 25, 2025Updated last year
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- introduction to dataflow analysis using julia☆14Oct 26, 2020Updated 5 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- ☆11Mar 19, 2023Updated 2 years ago
- Simple Encrypted File System for Occlum☆13Oct 29, 2025Updated 4 months ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Simple implementation of CoveringLSH☆10Jan 22, 2016Updated 10 years ago
- ☆25Updated this week
- Undelete open files and loop mounts ("improved" version of fdlink)☆10Apr 19, 2011Updated 14 years ago
- Go implementation of bcrypt_pbkdf(3) from OpenBSD☆15Feb 5, 2015Updated 11 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated last week
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- WordPress Sidebar Generator fully managed from WP Admin. No code required!☆39Feb 17, 2026Updated last week
- xdu自动填报&邮件推送☆11Dec 8, 2022Updated 3 years ago
- Ruby bindings for the Botan cryptographic library☆13Feb 4, 2020Updated 6 years ago
- Obsolete Github repo for the tiqr.org project. Note that the repository is split into several individual repos, all with a tiqr- prefix☆35Jul 2, 2022Updated 3 years ago
- ☆18Mar 15, 2025Updated 11 months ago
- Implementation of differential fuzz testing for TLS handshake messages☆11Jul 2, 2021Updated 4 years ago