Symmetric-key Hidden Vector Encryption Scheme
☆20Oct 1, 2018Updated 7 years ago
Alternatives and similar repositories for SHVE
Users that are interested in SHVE are comparing it to the libraries listed below
Sorting:
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Jul 7, 2024Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆205Jun 29, 2022Updated 3 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- python新手入门项目--会员管理系统☆10Mar 22, 2019Updated 6 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Feb 2, 2016Updated 10 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated 10 months ago
- 服务端负载均衡, 提供文件的秒传,支持断点续传,对重复文件进行了空间优化, 所有相同的文件只占用一份存储空间。☆11Jun 17, 2017Updated 8 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Apr 13, 2021Updated 4 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- Elliptic Curve Diffie Hellman with OpenSSL☆11Sep 10, 2013Updated 12 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 5 years ago
- Vici VC8145 multimeter alternative software☆11Mar 2, 2019Updated 6 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆12Mar 19, 2021Updated 4 years ago
- ☆14Feb 2, 2026Updated 3 weeks ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- a fast multiplier implement using verilog☆13Dec 23, 2014Updated 11 years ago
- Implementation of the CMAC keyed hash function using AES as block cipher.☆16Apr 2, 2025Updated 10 months ago
- ☆12Dec 18, 2020Updated 5 years ago
- "Low-Rate TCP-Targeted Denial of Service Attacks" experiment on Mininet☆15Mar 12, 2013Updated 12 years ago
- 本书是《5G Mobile Networks : A Systems Approach》(https://5g.systemsapproach.org/)的中文版翻译。☆13Jun 26, 2022Updated 3 years ago
- OCB-AES authenticated encryption for Python☆14Oct 22, 2021Updated 4 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Jun 17, 2019Updated 6 years ago
- Beamer theme with nice tricks for fullscreen pictures & videos☆12Apr 19, 2021Updated 4 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- Nice latex makefile that works out of the box☆13Dec 9, 2019Updated 6 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Nov 6, 2015Updated 10 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- haskell implementation of garbled circuits☆12Dec 3, 2017Updated 8 years ago
- An interactive for visualizing complex functions based on a 3Blue1Brown video and also estimation of Riemann Zeta Function using Euler Ma…☆19Mar 10, 2019Updated 6 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安 全的数据存储和访问服务的数据系统.☆18Jun 6, 2021Updated 4 years ago
- Concise, machine readable guitar tabs☆35Oct 14, 2017Updated 8 years ago
- The implementation of Ciphertext Policy Attribute Based Encryption in Java.☆18Dec 22, 2014Updated 11 years ago