simon-oya / NDSS21-osse-evaluationView external linksLinks
Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21
☆11Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for NDSS21-osse-evaluation
Users that are interested in NDSS21-osse-evaluation are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 25, 2024Updated last year
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- ☆18Mar 15, 2025Updated 11 months ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Mar 14, 2022Updated 3 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆27Nov 13, 2018Updated 7 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆76Apr 3, 2024Updated last year
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 9 years ago
- Vectorized Batch PIR implementation☆13Jun 22, 2023Updated 2 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- Symmetric Homomorphic Encryption☆10Jul 26, 2022Updated 3 years ago
- ☆10May 31, 2023Updated 2 years ago
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- An addon that automates rolling for items for vanilla WoW.☆17Feb 27, 2025Updated 11 months ago
- ☆13Aug 29, 2024Updated last year
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- This repo contains information about FeB4RAG collection☆17Feb 19, 2024Updated last year
- ☆19Sep 9, 2024Updated last year
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Feb 19, 2017Updated 8 years ago
- NoC simulation using gem5 (a simple tul)☆14Mar 23, 2024Updated last year
- [ICML 2024] Codes for C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models☆18Jun 4, 2024Updated last year
- Python implementation of the Fully Homomorphic Encryption Scheme TFHE☆16Jun 19, 2023Updated 2 years ago
- ☆68Feb 2, 2026Updated 2 weeks ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Mar 14, 2022Updated 3 years ago
- Oblivious Transfer extension in java☆18Nov 30, 2016Updated 9 years ago
- Python wrapper for labeled and unlabeled asymmetric private set intersection (APSI).☆17Apr 12, 2024Updated last year
- Private Set Union☆16Oct 24, 2022Updated 3 years ago
- Intro to Rust talk☆15Dec 7, 2022Updated 3 years ago
- Implementation for ZUC stream cipher☆16Jun 2, 2016Updated 9 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- Prototyp MegaScale-Infer: Serving Mixture-of-Experts at Scale with Disaggregated Expert Parallelism☆26Apr 4, 2025Updated 10 months ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Dec 24, 2025Updated last month
- The template for VLSI project☆27Mar 3, 2023Updated 2 years ago
- Benchmark framework of 3D integrated CIM accelerators for popular DNN inference, support both monolithic and heterogeneous 3D integration☆26Sep 21, 2021Updated 4 years ago
- ☆19Oct 27, 2023Updated 2 years ago
- Final Project for Udacity Machine Learning Course☆23Feb 5, 2016Updated 10 years ago
- Constant-weight PIR using Constant-weight Equality Operators☆23May 5, 2022Updated 3 years ago