Symmetric Searchable Encryption Library in Pure Java.
☆30Nov 18, 2015Updated 10 years ago
Alternatives and similar repositories for jsse
Users that are interested in jsse are comparing it to the libraries listed below
Sorting:
- Symmetric searchable encryption database.☆19Apr 16, 2016Updated 9 years ago
- Cryptographic toolkit for searchable encryption.☆29Jan 25, 2021Updated 5 years ago
- Ruby implementation of Boldyreva's order-preserving encryption scheme☆13May 13, 2025Updated 10 months ago
- Order-preserving encryption in Java☆30Mar 9, 2021Updated 5 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- Java implementations of two order-preserving encryption algorithms.☆39Jul 27, 2024Updated last year
- Summation of 2 + 3 using Fully Homomorphic Encryption (HElib)☆11Jun 17, 2016Updated 9 years ago
- ☆19Dec 2, 2018Updated 7 years ago
- The OPE lib extracted from CryptoDb☆17Jun 3, 2016Updated 9 years ago
- 《Java加密与解密的艺术》第2版☆12Jan 17, 2019Updated 7 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- Java implementation of an attribute-based encryption scheme☆18Apr 21, 2016Updated 9 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Mar 2, 2021Updated 5 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- Parse queries in Lucene and Elasticsearch syntaxes☆18Mar 3, 2016Updated 10 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- A simple mysql proxy.☆12Oct 23, 2013Updated 12 years ago
- 基于hyperledger fabric区块链搭建的医疗病例共享及转诊平台☆32Oct 22, 2022Updated 3 years ago
- Implementation of Boldyreva's symmetric order-preserving encryption in Python☆103Dec 7, 2022Updated 3 years ago
- Incremental Offline/Online PIR☆14Apr 4, 2024Updated last year
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 9 years ago
- a concurrent hash array mapped trie implementation in go☆59Jun 19, 2025Updated 9 months ago
- TreeMinHash: Fast Sketching for Weighted Jaccard Similarity Estimation☆17Aug 3, 2025Updated 7 months ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆77Apr 3, 2024Updated last year
- Fuzzy keyword search over encrypted data in cloud computing | PHP project☆26Oct 25, 2024Updated last year
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆58Sep 14, 2025Updated 6 months ago
- Implementation of a simple linear regression algorithm in MAMBA☆10Feb 12, 2020Updated 6 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- ☆13Jan 7, 2023Updated 3 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- Fortanix Baklava Design System☆15Updated this week
- ☆26Jun 18, 2019Updated 6 years ago
- EMF Binding for RDF☆25Jan 17, 2016Updated 10 years ago
- Social Network used for Intranets and Extranets☆11Updated this week
- word2vec java版本的一个实现☆16Jan 19, 2019Updated 7 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- The FFX Mode of Operation for Format-Preserving Encryption☆44Jan 9, 2026Updated 2 months ago