Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks
☆17Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for USENIX21-sap-code
Users that are interested in USENIX21-sap-code are comparing it to the libraries listed below
Sorting:
- ☆18Mar 15, 2025Updated last year
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- ☆10Mar 4, 2024Updated 2 years ago
- A Concretely Efficient Hierarchical Oblivious RAM☆14Nov 6, 2023Updated 2 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 4 years ago
- a drawTool by openGL☆13Jan 6, 2018Updated 8 years ago
- Book reading☆16Jun 5, 2020Updated 5 years ago
- A basic Text2SQL App, powered by Langchain and OpenAI.☆12Jun 27, 2024Updated last year
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- Call JVM from C/C++ in ThreadPool☆16Jun 15, 2020Updated 5 years ago
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆208Jun 29, 2022Updated 3 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- ☆13Apr 25, 2021Updated 4 years ago
- Recoded Kanban board for Visual Studio Code.☆16Nov 17, 2022Updated 3 years ago
- A library for binaries feature extraction☆12Nov 22, 2024Updated last year
- DECRYPTION DECEPTION☆12Dec 23, 2016Updated 9 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- Extract information from a PDF file via a conversational agent☆13Jan 28, 2024Updated 2 years ago
- ☆13Aug 29, 2024Updated last year
- Python script to check sorting networks and generate sorting network diagrams☆22Jan 9, 2025Updated last year
- ☆16Aug 31, 2021Updated 4 years ago
- A unified testbed for evaluating different Oblivious RAM☆61May 4, 2023Updated 2 years ago
- Vici VC8145 multimeter alternative software☆11Mar 2, 2019Updated 7 years ago
- a fast multiplier implement using verilog☆13Dec 23, 2014Updated 11 years ago
- Intro to Rust talk☆15Dec 7, 2022Updated 3 years ago
- 本项目基于ImageNet数据集预训练的VGG16和ResNet34网络模型,微调以提取遥感图像特征。我们尝试了多种特征聚合方法,通过使用PCA降维技术和扩展查询技术来优化特征存储、向量计算和特征检索效果。此外,我们还采用局部敏感哈希算法(LSH)实现了大规模遥感图像检索。…☆27Mar 31, 2023Updated 2 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆22Jun 20, 2024Updated last year
- Non-Adversarial Unsupervised Word Translation☆27Apr 2, 2020Updated 5 years ago
- Implementation of Deep Print, a Deep Learning based fixed-length Fingerprint Representation extractor, and various experiments with such …☆41Jan 26, 2024Updated 2 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated 11 months ago
- An address component tagger based on statistical natural language processing techniques☆11Apr 17, 2014Updated 11 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- ☆11Jun 21, 2022Updated 3 years ago
- Implementation of the CMAC keyed hash function using AES as block cipher.☆16Apr 2, 2025Updated 11 months ago
- 南京大学2016年《数据新闻》课程☆10Jun 16, 2017Updated 8 years ago
- This is a Tamarin model of TLS 1.3☆42Aug 19, 2023Updated 2 years ago