Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21
☆11Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for NDSS21-osse-evaluation
Users that are interested in NDSS21-osse-evaluation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Mar 15, 2025Updated last year
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆43Aug 16, 2018Updated 7 years ago
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- ☆10May 31, 2023Updated 2 years ago
- Symmetric Homomorphic Encryption☆11Jul 26, 2022Updated 3 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Oct 31, 2023Updated 2 years ago
- Vectorized Batch PIR implementation☆12Jun 22, 2023Updated 2 years ago
- An addon that automates rolling for items for vanilla WoW.☆17Feb 27, 2025Updated last year
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Feb 19, 2017Updated 9 years ago
- Python implementation of the Fully Homomorphic Encryption Scheme TFHE☆18Jun 19, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Implementation for ZUC stream cipher☆16Jun 2, 2016Updated 9 years ago
- ☆13Aug 29, 2024Updated last year
- Sample code demonstrating writing a router for django multi-db support☆19Aug 13, 2012Updated 13 years ago
- IPFS Encrypted Share☆22Aug 12, 2018Updated 7 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆28Mar 10, 2024Updated 2 years ago
- Private Set Union☆15Oct 24, 2022Updated 3 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- Python wrapper for labeled and unlabeled asymmetric private set intersection (APSI).☆17Apr 12, 2024Updated last year
- This repo contains information about FeB4RAG collection☆17Feb 19, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An Implementation of Incremental Distributed Point Functions in C++☆80Jan 5, 2026Updated 3 months ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- HEhub is a library for homomorphic encryption and its applications, and is part of the PrimiHub project.☆109Dec 20, 2022Updated 3 years ago
- [ICML 2024] Codes for C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models☆18Jun 4, 2024Updated last year
- NoC simulation using gem5 (a simple tul)☆14Mar 23, 2024Updated 2 years ago
- 同态加密算法的实现☆18Mar 20, 2019Updated 7 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆209Jun 29, 2022Updated 3 years ago
- ☆87Mar 20, 2026Updated 2 weeks ago
- Intro to Rust talk☆15Dec 7, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆21Jun 17, 2022Updated 3 years ago
- Constant-weight PIR using Constant-weight Equality Operators☆23May 5, 2022Updated 3 years ago
- ☆32Sep 30, 2025Updated 6 months ago
- 对称可搜索加密SWP方案的C++实现☆20May 5, 2021Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- ☆24Nov 27, 2025Updated 4 months ago
- Attribute-based Encryption☆206Jul 31, 2020Updated 5 years ago