A searchable encryption library from the Encrypted Systems Lab @ Brown University.
☆209Jun 29, 2022Updated 3 years ago
Alternatives and similar repositories for Clusion
Users that are interested in Clusion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆43Aug 16, 2018Updated 7 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Nov 18, 2015Updated 10 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Feb 19, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A version of OpenWhisper System's Signal App with secure message search (built with Clusion)☆21Jul 24, 2017Updated 8 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- An Implementation of Order-Revealing Encryption☆101Aug 31, 2020Updated 5 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Apr 13, 2021Updated 4 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆10Oct 10, 2017Updated 8 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Symmetric searchable encryption database.☆19Apr 16, 2016Updated 9 years ago
- Cryptographic toolkit for searchable encryption.☆29Jan 25, 2021Updated 5 years ago
- A unified testbed for evaluating different Oblivious RAM☆61May 4, 2023Updated 2 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆55Apr 9, 2020Updated 6 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆78Apr 3, 2024Updated 2 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆38Mar 3, 2016Updated 10 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- A cryptography library from NICS Lab☆20Jan 22, 2013Updated 13 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- 基于可搜索加密的云存储方案☆26May 8, 2019Updated 6 years ago
- A Flexible Efficient Secure Computation Backend☆33May 26, 2018Updated 7 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆13Sep 23, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Fuzzy keyword search over encrypted data in cloud computing | PHP project☆26Oct 25, 2024Updated last year
- ☆10Mar 24, 2020Updated 6 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Jun 2, 2017Updated 8 years ago
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 10 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago