Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks
☆16Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for USENIX21-sap-code
Users that are interested in USENIX21-sap-code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Mar 15, 2025Updated last year
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- ☆10Mar 4, 2024Updated 2 years ago
- A Concretely Efficient Hierarchical Oblivious RAM☆14Nov 6, 2023Updated 2 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- a drawTool by openGL☆12Apr 19, 2026Updated last month
- Book reading☆16Jun 5, 2020Updated 5 years ago
- A basic Text2SQL App, powered by Langchain and OpenAI.☆12Jun 27, 2024Updated last year
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Aug 16, 2018Updated 7 years ago
- Call JVM from C/C++ in ThreadPool☆15Apr 19, 2026Updated last month
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆210Jun 29, 2022Updated 3 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- ☆13Apr 25, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A library for binaries feature extraction☆12Nov 22, 2024Updated last year
- DECRYPTION DECEPTION☆12Dec 23, 2016Updated 9 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- Extract information from a PDF file via a conversational agent☆13Jan 28, 2024Updated 2 years ago
- ☆13Aug 29, 2024Updated last year
- Recoded Kanban board for Visual Studio Code.☆18Nov 17, 2022Updated 3 years ago
- Python script to check sorting networks and generate sorting network diagrams☆22Updated this week
- ☆16Aug 31, 2021Updated 4 years ago
- A unified testbed for evaluating different Oblivious RAM☆61May 4, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Vici VC8145 multimeter alternative software☆11Mar 2, 2019Updated 7 years ago
- a fast multiplier implement using verilog☆13Dec 23, 2014Updated 11 years ago
- 本项目基于ImageNet数据集预训练的VGG16和ResNet34网络模型,微调以提取遥感图像特征。我们尝试了多种特征聚合方法,通过使用PCA降维技术和扩展查询技术来优化特征存储、向量计算和特征检索效果。此外,我们还采用局部敏感哈希算法(LSH)实现了大规模遥感图像检索。…☆27Mar 31, 2023Updated 3 years ago
- Intro to Rust talk☆15Dec 7, 2022Updated 3 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆14Jan 28, 2020Updated 6 years ago
- ☆22Jun 20, 2024Updated last year
- Non-Adversarial Unsupervised Word Translation☆27Apr 2, 2020Updated 6 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An address component tagger based on statistical natural language processing techniques☆11Apr 17, 2014Updated 12 years ago
- Implementation of Deep Print, a Deep Learning based fixed-length Fingerprint Representation extractor, and various experiments with such …☆42Jan 26, 2024Updated 2 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Jun 16, 2021Updated 4 years ago
- Implementation of the CMAC keyed hash function using AES as block cipher.☆16Apr 2, 2025Updated last year
- ☆11Jun 21, 2022Updated 3 years ago
- The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the …☆10Jan 6, 2024Updated 2 years ago