jgharehchamani / SSELinks
☆26Updated 6 years ago
Alternatives and similar repositories for SSE
Users that are interested in SSE are comparing it to the libraries listed below
Sorting:
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time☆13Updated 3 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆45Updated 7 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆81Updated 2 months ago
- ☆20Updated 6 years ago
- ☆236Updated 2 weeks ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 3 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆179Updated 2 weeks ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆101Updated 2 years ago
- ☆183Updated 4 years ago
- C++ OT extension implementation☆128Updated 5 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆187Updated 2 years ago
- Boolean Query SSE schemes☆16Updated 7 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆28Updated last year
- Path ORAM reference implementation☆34Updated 5 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 3 years ago
- Example implementation of the SealPIR protocol☆157Updated last year
- Semi-honest Two Party Computation Based on Garbled Circuits.☆80Updated 2 weeks ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 7 years ago
- Efficient Private Set Intersection base on VOLE☆135Updated 2 months ago
- ☆31Updated 2 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated last week
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- ☆109Updated 3 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆78Updated last year
- Multi-party Private Set Union☆18Updated 9 months ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆37Updated 9 years ago
- Implementations of Private Set Intersection Protocols☆187Updated 5 months ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- An Implementation of Incremental Distributed Point Functions in C++☆77Updated 2 months ago