A searchable encryption library from the Encrypted Systems Lab @ Brown University.
☆209Jun 29, 2022Updated 3 years ago
Alternatives and similar repositories for Clusion
Users that are interested in Clusion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Jun 16, 2021Updated 4 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Aug 16, 2018Updated 7 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Oct 31, 2023Updated 2 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆58Feb 19, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A version of OpenWhisper System's Signal App with secure message search (built with Clusion)☆21Jul 24, 2017Updated 8 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- An Implementation of Order-Revealing Encryption☆101Aug 31, 2020Updated 5 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Nov 11, 2020Updated 5 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆10Oct 10, 2017Updated 8 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- Symmetric searchable encryption database.☆19Apr 16, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Cryptographic toolkit for searchable encryption.☆28Jan 25, 2021Updated 5 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆78Apr 3, 2024Updated 2 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆38Mar 3, 2016Updated 10 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- A cryptography library from NICS Lab☆20Jan 22, 2013Updated 13 years ago
- 基于可搜索加密的云存储方案☆26May 8, 2019Updated 6 years ago
- A Flexible Efficient Secure Computation Backend☆33May 26, 2018Updated 7 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆13Sep 23, 2021Updated 4 years ago
- Fuzzy keyword search over encrypted data in cloud computing | PHP project☆27Oct 25, 2024Updated last year
- ☆10Mar 24, 2020Updated 6 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Jun 2, 2017Updated 8 years ago
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆23May 2, 2022Updated 3 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- Java implementation of an attribute-based encryption scheme☆18Apr 21, 2016Updated 10 years ago
- An experimental version of the BQ client which adds client-side encryption☆175Feb 21, 2018Updated 8 years ago