Java implementations of two order-preserving encryption algorithms.
☆39Jul 27, 2024Updated last year
Alternatives and similar repositories for ope
Users that are interested in ope are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Partial Order Preserving Encryption☆21Feb 23, 2017Updated 9 years ago
- An Implementation of Order-Revealing Encryption☆101Aug 31, 2020Updated 5 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Nov 18, 2015Updated 10 years ago
- FPE - Format Preserving Encryption with FF3 in Java☆76Mar 20, 2026Updated last week
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 《Java加密与解密的艺术》第2版☆12Jan 17, 2019Updated 7 years ago
- Yao's Garbled Circuits (Java/AES)☆10Dec 9, 2013Updated 12 years ago
- ☆10Jun 28, 2013Updated 12 years ago
- tweet sentiment extraction of kaggle competition☆12Jul 2, 2020Updated 5 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Sep 15, 2025Updated 6 months ago
- Data Structure and Algorithm for Graphs☆16Nov 1, 2017Updated 8 years ago
- Format-Preserving Encryption Implementation in Java☆105May 29, 2023Updated 2 years ago
- Android RSA加密解密☆15Sep 16, 2015Updated 10 years ago
- Playing around with IDS data in Keras☆13Apr 13, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Elliptic Curve Diffie Hellman with OpenSSL☆11Sep 10, 2013Updated 12 years ago
- ☆15Sep 1, 2025Updated 6 months ago
- C++ coroutine protocol library.☆12Sep 2, 2025Updated 6 months ago
- A extension for chrome providing a personal assistant bot☆10Dec 13, 2022Updated 3 years ago
- Team AerialRobotics Wiki☆16Feb 9, 2025Updated last year
- Shapley value calculation in Java☆13Dec 14, 2021Updated 4 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- Canonical repository https://git.dbogatov.org/bu/ore-benchmark/Project-Code☆20Dec 8, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 服务端负载均衡, 提供文件的秒传,支持断点续传,对重复文件进行了空间优化, 所有相同的文件只占用一份存储空间。☆11Jun 17, 2017Updated 8 years ago
- ☆11Nov 19, 2019Updated 6 years ago
- FAEST reference implementation☆19Feb 27, 2026Updated last month
- Created an inverted index in Python for document retreival☆13Oct 7, 2018Updated 7 years ago
- An experimental Chord implement for decentralized, serverless applications on browsers☆17Apr 17, 2021Updated 4 years ago
- 南京大学2019年“计算社会科学”论文工作坊☆15Jul 7, 2019Updated 6 years ago
- ☆11Jul 11, 2024Updated last year
- "Low-Rate TCP-Targeted Denial of Service Attacks" experiment on Mininet☆15Mar 12, 2013Updated 13 years ago
- The implementation of Ciphertext Policy Attribute Based Encryption in Java.☆18Dec 22, 2014Updated 11 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆12Jul 27, 2018Updated 7 years ago
- [SIGMOD'25] We show the data chunk compaction problem in vectorized execution, and propose practical compaction solutions.☆14Oct 10, 2025Updated 5 months ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆285Jan 4, 2025Updated last year
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆14Jun 21, 2024Updated last year
- An Inverted Index generator implemented in Go used for text search in large document sets.☆18Dec 7, 2019Updated 6 years ago