Symmetric-key Hidden Vector Encryption Scheme
☆20Oct 1, 2018Updated 7 years ago
Alternatives and similar repositories for SHVE
Users that are interested in SHVE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆15Jul 7, 2024Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 5 years ago
- python新手入门项目--会员管理系统☆10Mar 22, 2019Updated 7 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Jun 16, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆78Apr 3, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- haskell implementation of garbled circuits☆12Dec 3, 2017Updated 8 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆58Feb 19, 2017Updated 9 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆12Mar 20, 2026Updated last month
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Feb 2, 2016Updated 10 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆41Apr 13, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 基于netty实现的一个数据库代理服务,可用作动态脱敏系统☆12Feb 16, 2022Updated 4 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Updated this week
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Jun 17, 2019Updated 6 years ago
- 区块链项目,实现学生证书上链、验证真伪、查询以及跨校查询功能☆16May 10, 2019Updated 7 years ago
- The implementation of Ciphertext Policy Attribute Based Encryption in Java.☆18Dec 22, 2014Updated 11 years ago
- 北理工计算机CS期末考试复习资料/历年考题汇总,欢迎PR☆13May 25, 2021Updated 4 years ago
- 基于Spring Aop实现的脱敏组件,支持自定义脱敏策略☆17Dec 20, 2020Updated 5 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Vici VC8145 multimeter alternative software☆11Mar 2, 2019Updated 7 years ago
- Research implementation of cryptographic accumulators☆30Dec 11, 2020Updated 5 years ago
- a fast multiplier implement using verilog☆13Dec 23, 2014Updated 11 years ago
- Standalone Access Registration (SAR) is the process by which a device registers with a 5G network to gain access to its services. It invo…☆24Mar 25, 2023Updated 3 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆14Jan 28, 2020Updated 6 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Jun 6, 2021Updated 4 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated last year
- generate code for struct conversion/copy in go☆23Sep 28, 2025Updated 7 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the …☆10Jan 6, 2024Updated 2 years ago
- Nice latex makefile that works out of the box☆13Dec 9, 2019Updated 6 years ago
- Materials about Privacy-Preserving Machine Learning☆265Feb 2, 2026Updated 3 months ago
- ☆20Apr 28, 2022Updated 4 years ago
- [ACM Computing Survey 2025] Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey, by MARS Group at Wuhan Univ…☆23Apr 9, 2025Updated last year
- ☆20Jan 14, 2025Updated last year
- AVX512 population count routines☆23Aug 2, 2019Updated 6 years ago