☆11Nov 30, 2015Updated 10 years ago
Alternatives and similar repositories for id-based-encryption
Users that are interested in id-based-encryption are comparing it to the libraries listed below
Sorting:
- FMCW ultrasound hand distance tracking Android app☆11Jan 19, 2018Updated 8 years ago
- Artificial Bee Colony Algorithm(ABC)☆13Mar 4, 2016Updated 10 years ago
- mirror for the R package "piratings" https://cran.r-project.org/web/packages/piratings/index.html, calculate dynamic performance ratings…☆13May 17, 2019Updated 6 years ago
- Tools for STM32F103 and STM32F407☆10May 21, 2018Updated 7 years ago
- 网上的许多爬虫都不适用于现在的知乎了,所以自己写了一个☆11Dec 22, 2018Updated 7 years ago
- A series of animation challenges in React Native.☆16Jun 22, 2018Updated 7 years ago
- Wikipedia web crawler and Google's PageRank algorithm implementation☆20Jan 4, 2020Updated 6 years ago
- Here we estimate an optical flow from a sequence of images, in other words, we will study motion estimation, that is, we will try to dete…☆16Feb 9, 2019Updated 7 years ago
- 知识库问答系统☆13Aug 28, 2018Updated 7 years ago
- Tools to apply Ultrasound sensing using an Android smartphone.☆18Sep 14, 2015Updated 10 years ago
- 【转】Demonstrate all the questions on LeetCode in the form of animation.(用动画的形式呈现解LeetCode题目的思路)☆12Jun 11, 2019Updated 6 years ago
- This is the sample projects used in node js traning sessions☆13May 10, 2019Updated 6 years ago
- It is a public-key encryption in which the public key of a user is identity(unique).☆14May 25, 2015Updated 10 years ago
- Experimental encrypted file system using SGX and FUSE☆12Oct 9, 2018Updated 7 years ago
- Cross-Speaker Encoding Network for Multi-talker Speech Recognition☆12Mar 14, 2025Updated last year
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- 一个轻量级的消息传输协议☆10Updated this week
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- 关于Java和Python爬虫那些事儿☆20Jan 19, 2021Updated 5 years ago
- ☆53Mar 15, 2026Updated last week
- Bitcoin ID-Based Encryption☆21Feb 19, 2019Updated 7 years ago
- Acoustic modems in Java and Matlab☆45May 5, 2012Updated 13 years ago
- send Unicode PDU sms with c# and 3G modem☆11Aug 2, 2021Updated 4 years ago
- Treat XPath expressions as Python objects☆11Mar 31, 2021Updated 4 years ago
- ☆20Feb 17, 2021Updated 5 years ago
- C++ code for running a yolov5s model.☆26Oct 26, 2020Updated 5 years ago
- ☆12Mar 1, 2022Updated 4 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- A minimalist library to render PNG images using pure Python☆44Feb 4, 2020Updated 6 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- 自然语言处理_CCF大数据与计算智能大赛_面向数据安全治理的数据内容智能发现与分级分类☆11Nov 17, 2022Updated 3 years ago
- a lib for bls signature in golang☆11Nov 29, 2020Updated 5 years ago
- Part II of the tutorial for making a PoC in foundry for Immunefi☆11Aug 29, 2022Updated 3 years ago
- xfstests adapted for gocryptfs, from https://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git☆12Nov 13, 2025Updated 4 months ago
- A python library providing several polynomial-based Private Set Intersection protocols.☆46Oct 19, 2014Updated 11 years ago
- ☆10Mar 8, 2017Updated 9 years ago
- Package generating elasticsearch mapping from jsonschemas☆14Jul 31, 2019Updated 6 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- Coursera Machine Learning Japanese Translation☆45Oct 19, 2018Updated 7 years ago