Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks
☆16Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for USENIX21-sap-code
Users that are interested in USENIX21-sap-code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Mar 15, 2025Updated last year
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- ☆10Mar 4, 2024Updated 2 years ago
- A Concretely Efficient Hierarchical Oblivious RAM☆14Nov 6, 2023Updated 2 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- a drawTool by openGL☆12Apr 19, 2026Updated last week
- Book reading☆16Jun 5, 2020Updated 5 years ago
- A basic Text2SQL App, powered by Langchain and OpenAI.☆12Jun 27, 2024Updated last year
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Aug 16, 2018Updated 7 years ago
- Call JVM from C/C++ in ThreadPool☆15Apr 19, 2026Updated last week
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆209Jun 29, 2022Updated 3 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- ☆13Apr 25, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A library for binaries feature extraction☆12Nov 22, 2024Updated last year
- DECRYPTION DECEPTION☆12Dec 23, 2016Updated 9 years ago
- Recoded Kanban board for Visual Studio Code.☆17Nov 17, 2022Updated 3 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- Extract information from a PDF file via a conversational agent☆13Jan 28, 2024Updated 2 years ago
- ☆13Aug 29, 2024Updated last year
- Python script to check sorting networks and generate sorting network diagrams☆22Jan 9, 2025Updated last year
- ☆16Aug 31, 2021Updated 4 years ago
- A unified testbed for evaluating different Oblivious RAM☆61May 4, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Vici VC8145 multimeter alternative software☆11Mar 2, 2019Updated 7 years ago
- a fast multiplier implement using verilog☆13Dec 23, 2014Updated 11 years ago
- 本项目基于ImageNet数据集预训练的VGG16和ResNet34网络模型,微调以提取遥感图像特征。我们尝试了多种特征聚合方法,通过使用PCA降维技术和扩展查询技术来优化特征存储、向量计算和特征检索效果。此外,我们还采用局部敏感哈希算法(LSH)实现了大规模遥感图像检索。…☆27Mar 31, 2023Updated 3 years ago
- Intro to Rust talk☆15Dec 7, 2022Updated 3 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆13Jan 28, 2020Updated 6 years ago
- ☆22Jun 20, 2024Updated last year
- Non-Adversarial Unsupervised Word Translation☆27Apr 2, 2020Updated 6 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An address component tagger based on statistical natural language processing techniques☆11Apr 17, 2014Updated 12 years ago
- Implementation of Deep Print, a Deep Learning based fixed-length Fingerprint Representation extractor, and various experiments with such …☆43Jan 26, 2024Updated 2 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Jun 16, 2021Updated 4 years ago
- ☆11Jun 21, 2022Updated 3 years ago
- Implementation of the CMAC keyed hash function using AES as block cipher.☆16Apr 2, 2025Updated last year
- The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the …☆10Jan 6, 2024Updated 2 years ago