paulveillard / cybersecurity-searchable-symmetric-encryptionLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Searchable Symmetric Encryption.
☆16Updated last year
Alternatives and similar repositories for cybersecurity-searchable-symmetric-encryption
Users that are interested in cybersecurity-searchable-symmetric-encryption are comparing it to the libraries listed below
Sorting:
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Updated 2 years ago
- implementation of seren☆13Updated 6 months ago
- A TEE programming framework based on trusted functions.☆14Updated 4 years ago
- ☆36Updated 4 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- ☆15Updated last month
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated 11 months ago
- Monomi designer and planner prototype☆14Updated 10 years ago
- Implementation of the Findex searchable encryption scheme☆14Updated this week
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 6 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆57Updated 4 years ago
- StealthDB: an encrypted database from intel sgx with small trusted computing base.☆60Updated 3 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Updated 3 years ago
- Multilayered, Log-structured Secure Disk (MlsDisk) protects the disk I/O for TEEs☆16Updated 11 months ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- Jinzhao Attest provides unified attestation workflow for TEE compatibility, usability and security.☆34Updated last year
- A two-party secure function evaluation using Yao's garbled circuit protocol☆75Updated 11 months ago
- A high-throughput oblivious storage system☆26Updated 2 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- Efficient Multi-User Searchable Encrypted Database☆11Updated 6 months ago
- HyperEnclave is an open and cross-platform trusted execution environment.☆47Updated 4 months ago
- An Open and Cross-platform Trusted Execution Environment.☆148Updated 8 months ago
- This is a simple implementation in Python of the Order Revealing scheme of Chenette et al. For more details refer to the original work:☆7Updated 4 years ago
- Private Information Retrieval protocol☆45Updated 4 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 3 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆212Updated 5 months ago
- Near-Optimal Oblivious Key-Value Stores☆12Updated last year