☆10Apr 22, 2018Updated 7 years ago
Alternatives and similar repositories for RingORAM
Users that are interested in RingORAM are comparing it to the libraries listed below
Sorting:
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆26Mar 17, 2019Updated 6 years ago
- A Concretely Efficient Hierarchical Oblivious RAM☆13Nov 6, 2023Updated 2 years ago
- A high-throughput oblivious storage system☆28May 31, 2023Updated 2 years ago
- Open-source library for ORAM implementations☆11Apr 15, 2020Updated 5 years ago
- Path ORAM reference implementation☆35Jul 25, 2020Updated 5 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Oct 24, 2022Updated 3 years ago
- ☆32Jul 12, 2023Updated 2 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- ☆22Jun 20, 2024Updated last year
- A tool to discover and monitor X509 certificates☆10Nov 22, 2025Updated 3 months ago
- An address component tagger based on statistical natural language processing techniques☆11Apr 17, 2014Updated 11 years ago
- ☆36Oct 26, 2020Updated 5 years ago
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆12Sep 4, 2024Updated last year
- A GIS powered study to check whether China is to blame for the air pollution in South Korea.☆12Sep 8, 2019Updated 6 years ago
- (包含完整代码和坑点记录)Student version of Assignment 1 for Stanford CS336 - Language Modeling From Scratch☆25Jan 22, 2026Updated last month
- 南京大学2016年《数据新闻》课程☆10Jun 16, 2017Updated 8 years ago
- Coinbase tag and coinbase output address based mining-pool identification for rust-bitcoin's bitcoin::{Block, Transaction}☆12Jan 22, 2026Updated last month
- Simple methods for reading and writing PCM wave files.☆12Jun 22, 2022Updated 3 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆13Feb 13, 2026Updated 2 weeks ago
- ☆11Jun 21, 2022Updated 3 years ago
- 中国外交部模拟器网站首页 (People's Republic of China Oral Sex)☆10Apr 25, 2020Updated 5 years ago
- 2024年舆情与新闻数据学的内容展示☆15Nov 22, 2024Updated last year
- 哈工大机器学习作业一——多项式拟合曲线☆10Oct 19, 2016Updated 9 years ago
- ## 数据挖掘流程 **(一)数据读取** - 读取数据,并进行展示 - 统计数据各项指标 - 明确数据规模与要完成的任务 **(二)特征理解分析** - 单特征分析,逐个变量分析其对结果的影响 - 多变量统计分析,综合考虑多种情况影响 - 统计绘图得…☆10Mar 11, 2020Updated 5 years ago
- [ICLR 2025] ELICIT: LLM Augmentation Via External In-context Capability☆13Mar 11, 2025Updated 11 months ago
- ☆12Nov 4, 2022Updated 3 years ago
- 国密版Fabric、Fabric-SDK-GO、Fabric-CA测试demo☆12Oct 25, 2019Updated 6 years ago
- ☆18Mar 15, 2025Updated 11 months ago
- ☆12Dec 15, 2022Updated 3 years ago
- ☆15Apr 6, 2022Updated 3 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- LeanEngine GAE Server☆26Apr 20, 2013Updated 12 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- ☆14Jan 7, 2023Updated 3 years ago
- Polkadex Off-chain Orderbook☆11Feb 10, 2022Updated 4 years ago
- ☆12May 22, 2023Updated 2 years ago
- Learn about collaborative bitcoin transactions. Reclaim your privacy.☆15Apr 28, 2024Updated last year
- 复杂网络可视化mock工具☆13Aug 30, 2018Updated 7 years ago
- ☆21Sep 18, 2025Updated 5 months ago