rogerioacp / oramView external linksLinks
Open-source library for ORAM implementations
☆11Apr 15, 2020Updated 5 years ago
Alternatives and similar repositories for oram
Users that are interested in oram are comparing it to the libraries listed below
Sorting:
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆26Mar 17, 2019Updated 6 years ago
- Path ORAM reference implementation☆35Jul 25, 2020Updated 5 years ago
- ☆10Apr 22, 2018Updated 7 years ago
- POSUP: Oblivious Search and Update Platform with SGX (PETS'19)☆13Feb 11, 2020Updated 6 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Oct 24, 2022Updated 3 years ago
- ☆32Jul 12, 2023Updated 2 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- Resizable ORAM, remote storage agnostic, written in Rust☆74Jun 29, 2022Updated 3 years ago
- ORAM and related for Intel SGX enclaves☆53Sep 4, 2023Updated 2 years ago
- ☆22Jun 20, 2024Updated last year
- An address component tagger based on statistical natural language processing techniques☆11Apr 17, 2014Updated 11 years ago
- ☆36Oct 26, 2020Updated 5 years ago
- (包含完整代码和坑点记录)Student version of Assignment 1 for Stanford CS336 - Language Modeling From Scratch☆24Jan 22, 2026Updated 3 weeks ago
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆12Sep 4, 2024Updated last year
- A Concretely Efficient Hierarchical Oblivious RAM☆13Nov 6, 2023Updated 2 years ago
- ☆11Aug 28, 2024Updated last year
- ☆11Jun 21, 2022Updated 3 years ago
- [ICLR 2025] ELICIT: LLM Augmentation Via External In-context Capability☆13Mar 11, 2025Updated 11 months ago
- 中国外交部模拟器网站首页 (People's Republic of China Oral Sex)☆10Apr 25, 2020Updated 5 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- 南京大学2016年《数据新闻》课程☆10Jun 16, 2017Updated 8 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- ## 数据挖掘流程 **(一)数据读取** - 读取数据,并进行展示 - 统计数据各项指标 - 明确数据规模与要完成的任务 **(二)特征理解分析** - 单特征分析,逐个变量分析其对结果的影响 - 多变量统计分析,综合考虑多种情况影响 - 统计绘图得…☆10Mar 11, 2020Updated 5 years ago
- 2024年舆情与新闻数据学的内容展示☆15Nov 22, 2024Updated last year
- 哈工大机器学习作业一——多项式拟合曲线☆10Oct 19, 2016Updated 9 years ago
- Coinbase tag and coinbase output address based mining-pool identification for rust-bitcoin's bitcoin::{Block, Transaction}☆12Jan 22, 2026Updated 3 weeks ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Learn about collaborative bitcoin transactions. Reclaim your privacy.☆15Apr 28, 2024Updated last year
- ☆11Mar 8, 2021Updated 4 years ago
- JSFlow is a security-enhanced JavaScript interpreter for fine-grained tracking of information flow.☆15May 28, 2021Updated 4 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- ☆12Apr 9, 2022Updated 3 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- Set of modifications for Deno to add subprocess sandboxing☆13May 25, 2023Updated 2 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- 国密版Fabric、Fabric-SDK-GO、Fabric-CA测试demo☆12Oct 25, 2019Updated 6 years ago
- ☆12Dec 15, 2022Updated 3 years ago