Cryptographic toolkit for searchable encryption.
☆29Jan 25, 2021Updated 5 years ago
Alternatives and similar repositories for crypto-tk
Users that are interested in crypto-tk are comparing it to the libraries listed below
Sorting:
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆77Apr 3, 2024Updated last year
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Feb 19, 2017Updated 9 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- ☆13Feb 3, 2026Updated last month
- Charm: A Framework for Rapidly Prototyping Cryptosystems☆632Mar 8, 2026Updated 2 weeks ago
- Automatically exported from code.google.com/p/xml2rfc-xxe☆11Jul 9, 2022Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆22May 2, 2022Updated 3 years ago
- Call JVM from C/C++ in ThreadPool☆16Jun 15, 2020Updated 5 years ago
- low-level DNS library☆20Aug 27, 2024Updated last year
- Ruby gem used to load, validate, and parse European Data Format files. Used for batch testing EDFs for errors.☆14Mar 1, 2019Updated 7 years ago
- Gibbs sampling inference to LDA☆19Apr 4, 2014Updated 11 years ago
- ☆29Nov 10, 2023Updated 2 years ago
- Example of private, public key generation and shared secret derivation using OpenSSL and the x25519 curve.☆12Jun 1, 2017Updated 8 years ago
- An Introduction to Using Jekyll With Bootstrap 4☆12Oct 6, 2022Updated 3 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Jun 6, 2021Updated 4 years ago
- Node.js DTLS Proxy, library and tools to connect plain-text UDP clients with plain-text UDP servers over an encrypted UDP tunnel..☆14Dec 2, 2018Updated 7 years ago
- ☆22May 18, 2019Updated 6 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- ☆22May 21, 2024Updated last year
- Automated Cryptographic Transformations☆28Aug 23, 2021Updated 4 years ago
- PPH in C☆24Nov 21, 2025Updated 4 months ago
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- Intel Paillier Cryptosystem Library is an open-source library which provides accelerated performance of a partial homomorphic encryption …☆80Jun 30, 2025Updated 8 months ago
- Signed URLs for small devices.☆67Nov 4, 2025Updated 4 months ago
- Paillier Homomorphic Addition Public Key Cryptosystem☆18Dec 5, 2020Updated 5 years ago
- Yet another credential store 🔐☆16May 8, 2025Updated 10 months ago
- ☆18Nov 6, 2025Updated 4 months ago
- 🪟 A modern desktop environment for Skift & Linux (mirror)☆17Updated this week
- The AI-First Software Development (AIFSD) Manifesto☆23Feb 17, 2026Updated last month
- BlindBox is a tool to isolate and deploy applications inside Trusted Execution Environments for privacy-by-design apps☆65Nov 13, 2023Updated 2 years ago
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- ☆14May 17, 2025Updated 10 months ago
- ☆32Sep 30, 2025Updated 5 months ago
- Implementation of ECDAA☆23Nov 10, 2017Updated 8 years ago
- A multi-arch library implementing the Argon2 password hashing algorithm.☆17Sep 4, 2023Updated 2 years ago
- Opening the world of search.☆11Jun 13, 2025Updated 9 months ago