simon-oya / NDSS21-osse-evaluationView external linksLinks
Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21
☆11Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for NDSS21-osse-evaluation
Users that are interested in NDSS21-osse-evaluation are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 25, 2024Updated last year
- ☆18Mar 15, 2025Updated 11 months ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Mar 14, 2022Updated 3 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆27Nov 13, 2018Updated 7 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆76Apr 3, 2024Updated last year
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 9 years ago
- Symmetric Homomorphic Encryption☆10Jul 26, 2022Updated 3 years ago
- Vectorized Batch PIR implementation☆13Jun 22, 2023Updated 2 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- 收集整理大模型面试题☆12Aug 29, 2024Updated last year
- Sample code demonstrating writing a router for django multi-db support☆19Aug 13, 2012Updated 13 years ago
- ☆10May 31, 2023Updated 2 years ago
- FoC☆17Jul 20, 2025Updated 6 months ago
- An addon that automates rolling for items for vanilla WoW.☆17Feb 27, 2025Updated 11 months ago
- ☆13Aug 29, 2024Updated last year
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Oct 31, 2023Updated 2 years ago
- This repo contains information about FeB4RAG collection☆17Feb 19, 2024Updated last year
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆18Mar 10, 2025Updated 11 months ago
- ☆19Sep 9, 2024Updated last year
- NoC simulation using gem5 (a simple tul)☆14Mar 23, 2024Updated last year
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Feb 19, 2017Updated 8 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- [ICML 2024] Codes for C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models☆18Jun 4, 2024Updated last year
- Python implementation of the Fully Homomorphic Encryption Scheme TFHE☆16Jun 19, 2023Updated 2 years ago
- ☆15Nov 3, 2023Updated 2 years ago
- Oblivious Transfer extension in java☆18Nov 30, 2016Updated 9 years ago
- Python B+ Tree basic implementation and Visualization☆13Sep 29, 2019Updated 6 years ago
- ☆68Feb 2, 2026Updated 2 weeks ago
- 将Python程序(.py)转换为Windows可执行文件(.exe)☆14May 12, 2018Updated 7 years ago
- Python wrapper for labeled and unlabeled asymmetric private set intersection (APSI).☆17Apr 12, 2024Updated last year
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Mar 14, 2022Updated 3 years ago
- Private Set Union☆16Oct 24, 2022Updated 3 years ago
- Intro to Rust talk☆15Dec 7, 2022Updated 3 years ago