Boolean Query SSE schemes
☆15Aug 28, 2018Updated 7 years ago
Alternatives and similar repositories for Boolean-Query-SSE
Users that are interested in Boolean-Query-SSE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆43Aug 16, 2018Updated 7 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Jul 7, 2024Updated last year
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Apr 13, 2021Updated 4 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 4 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- ☆10Mar 24, 2020Updated 6 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆78Apr 3, 2024Updated 2 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆209Jun 29, 2022Updated 3 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- Searchable Symmetric Encryption☆15Dec 2, 2022Updated 3 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆28Mar 10, 2024Updated 2 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Nov 18, 2015Updated 10 years ago
- OCB-AES authenticated encryption for Python☆14Oct 22, 2021Updated 4 years ago
- python新手入门项目--会员管理系统☆10Mar 22, 2019Updated 7 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- ☆10May 31, 2023Updated 2 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Feb 19, 2017Updated 9 years ago
- Symmetric Homomorphic Encryption☆11Jul 26, 2022Updated 3 years ago
- haskell implementation of garbled circuits☆12Dec 3, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time☆12May 22, 2022Updated 3 years ago
- ☆34Sep 3, 2019Updated 6 years ago
- a drawTool by openGL☆13Jan 6, 2018Updated 8 years ago
- Call JVM from C/C++ in ThreadPool☆16Jun 15, 2020Updated 5 years ago
- 本书是《5G Mobile Networks : A Systems Approach》(https://5g.systemsapproach.org/)的中文版翻译。☆13Jun 26, 2022Updated 3 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- burp被动插件扫反射xss☆14Nov 29, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implementation for ZUC stream cipher☆16Jun 2, 2016Updated 9 years ago
- Example of a Python-C++ interface using gRPC☆11Jun 23, 2023Updated 2 years ago
- Supplementary cryptography libraries☆16May 23, 2022Updated 3 years ago
- Benchmarks for various multi-party computation frameworks☆18Oct 28, 2024Updated last year
- 南京大学2019年“计算社会科学”论文工作坊☆15Jul 7, 2019Updated 6 years ago
- I don't order you to fight, I order you to die.☆12May 2, 2022Updated 3 years ago
- ☆13Dec 18, 2020Updated 5 years ago