paulveillard / cybersecurity-searchable-symmetric-encryptionLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Searchable Symmetric Encryption.
☆15Updated last year
Alternatives and similar repositories for cybersecurity-searchable-symmetric-encryption
Users that are interested in cybersecurity-searchable-symmetric-encryption are comparing it to the libraries listed below
Sorting:
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- implementation of seren☆13Updated 6 months ago
- Implementation of the Findex searchable encryption scheme☆14Updated this week
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated 11 months ago
- Near-Optimal Oblivious Key-Value Stores☆12Updated last year
- A TEE programming framework based on trusted functions.☆14Updated 4 years ago
- Cryptographic toolkit for searchable encryption.☆27Updated 4 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆10Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Updated 3 years ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation (IEEE S&P 2024)☆15Updated last year
- Monomi designer and planner prototype☆14Updated 10 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- C++ Library for Mobile Private Contact Discovery☆27Updated 4 years ago
- ☆15Updated last month
- Boolean Query SSE schemes☆16Updated 6 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆75Updated 11 months ago
- Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets☆43Updated 2 years ago
- ☆36Updated 4 years ago
- Implementation of Oblivious Dynamic Searchable Encryption Framework☆8Updated 7 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- StealthDB: an encrypted database from intel sgx with small trusted computing base.☆60Updated 3 years ago
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- ☆20Updated 6 years ago
- Cerebro: A platform for Secure Coopetitive Learning☆21Updated 3 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated 10 months ago
- a C++ library for Pretty Good Confidential Transaction System☆16Updated 2 years ago
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 6 years ago
- Multi-Authority Policy-based Chameleon Hash☆13Updated 4 years ago
- ☆25Updated 2 years ago