Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks
☆17Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for USENIX21-sap-code
Users that are interested in USENIX21-sap-code are comparing it to the libraries listed below
Sorting:
- ☆18Mar 15, 2025Updated 11 months ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 3 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- ☆22Jun 20, 2024Updated last year
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- An address component tagger based on statistical natural language processing techniques☆11Apr 17, 2014Updated 11 years ago
- ☆10Mar 4, 2024Updated last year
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆12Sep 4, 2024Updated last year
- A Concretely Efficient Hierarchical Oblivious RAM☆13Nov 6, 2023Updated 2 years ago
- (包含完整代码和坑点记录)Student version of Assignment 1 for Stanford CS336 - Language Modeling From Scratch☆25Jan 22, 2026Updated last month
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated 10 months ago
- 南京大学2016年《数据新闻》课程☆10Jun 16, 2017Updated 8 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- 哈工大机器学习作业一——多项式拟合曲线☆10Oct 19, 2016Updated 9 years ago
- Coinbase tag and coinbase output address based mining-pool identification for rust-bitcoin's bitcoin::{Block, Transaction}☆12Jan 22, 2026Updated last month
- ☆11Jun 21, 2022Updated 3 years ago
- [ICLR 2025] ELICIT: LLM Augmentation Via External In-context Capability☆13Mar 11, 2025Updated 11 months ago
- 中国外交部模拟器网站首页 (People's Republic of China Oral Sex)☆10Apr 25, 2020Updated 5 years ago
- ☆10Apr 22, 2018Updated 7 years ago
- ## 数据挖掘流程 **(一)数据读取** - 读取数据,并进行展示 - 统计数据各项指标 - 明确数据规模与要完成的任务 **(二)特征理解分析** - 单特征分析,逐个变量分析其对结果的影响 - 多变量统计分析,综合考虑多种情况影响 - 统计绘图得…☆10Mar 11, 2020Updated 5 years ago
- 2024年舆情与新闻数据学的内容展示☆15Nov 22, 2024Updated last year
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- ☆14Feb 2, 2026Updated last month
- ☆15Apr 6, 2022Updated 3 years ago
- ☆12Dec 15, 2022Updated 3 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- 国密版Fabric、Fabric-SDK-GO、Fabric-CA测试demo☆12Oct 25, 2019Updated 6 years ago
- Vici VC8145 multimeter alternative software☆11Mar 2, 2019Updated 7 years ago
- Open-source library for ORAM implementations☆11Apr 15, 2020Updated 5 years ago
- ☆13Aug 29, 2024Updated last year
- Learn about collaborative bitcoin transactions. Reclaim your privacy.☆15Apr 28, 2024Updated last year
- DECRYPTION DECEPTION☆12Dec 23, 2016Updated 9 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆205Jun 29, 2022Updated 3 years ago
- The source code for the monerovexplorer.com website☆16Mar 10, 2018Updated 7 years ago
- A basic Text2SQL App, powered by Langchain and OpenAI.☆12Jun 27, 2024Updated last year
- ☆16Aug 31, 2021Updated 4 years ago
- Recoded Kanban board for Visual Studio Code.☆15Nov 17, 2022Updated 3 years ago
- 开源GIS课程-云南大学☆25Dec 16, 2025Updated 2 months ago