CP-ABE测试加解密操作和密钥生成操作的性能
☆11Jun 24, 2020Updated 5 years ago
Alternatives and similar repositories for CP-ABE-test
Users that are interested in CP-ABE-test are comparing it to the libraries listed below
Sorting:
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Jun 6, 2021Updated 4 years ago
- ☆19Dec 2, 2018Updated 7 years ago
- Graduate Project: CP-ABE-Encrypt☆22Sep 27, 2013Updated 12 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 3 years ago
- ☆22Jun 20, 2024Updated last year
- An address component tagger based on statistical natural language processing techniques☆11Apr 17, 2014Updated 11 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆37Jan 12, 2019Updated 7 years ago
- The Description of the project you can watch my blog☆37Apr 18, 2021Updated 4 years ago
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆12Sep 4, 2024Updated last year
- (包含完整代码和坑点记录)Student version of Assignment 1 for Stanford CS336 - Language Modeling From Scratch☆25Jan 22, 2026Updated last month
- ## 数据挖掘流程 **(一)数据读取** - 读取数据,并进行展示 - 统计数据各项指标 - 明确数据规模与要完成的任务 **(二)特征理解分析** - 单特征分析,逐个变量分析其对结果的影响 - 多变量统计分析,综合考虑多种情况影响 - 统计绘图得…☆10Mar 11, 2020Updated 5 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- 南京大学2016年《数据新闻》课程☆10Jun 16, 2017Updated 8 years ago
- 哈工大机器学习作业一——多项式拟合曲线☆10Oct 19, 2016Updated 9 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- [ICLR 2025] ELICIT: LLM Augmentation Via External In-context Capability☆13Mar 11, 2025Updated 11 months ago
- Testing AVX capabilities with GCC☆11Jan 24, 2016Updated 10 years ago
- 中国外交部模拟器网站首页 (People's Republic of China Oral Sex)☆10Apr 25, 2020Updated 5 years ago
- ☆11Jun 21, 2022Updated 3 years ago
- ☆10Apr 22, 2018Updated 7 years ago
- ☆11May 7, 2020Updated 5 years ago
- 2024年舆情与新闻数据学的内容展示☆15Nov 22, 2024Updated last year
- Coinbase tag and coinbase output address based mining-pool identification for rust-bitcoin's bitcoin::{Block, Transaction}☆12Jan 22, 2026Updated last month
- ☆12Dec 15, 2022Updated 3 years ago
- Learn about collaborative bitcoin transactions. Reclaim your privacy.☆15Apr 28, 2024Updated last year
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- 国密版Fabric、Fabric-SDK-GO、Fabric-CA测试demo☆12Oct 25, 2019Updated 6 years ago
- ☆15Apr 6, 2022Updated 3 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- Open-source library for ORAM implementations☆11Apr 15, 2020Updated 5 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- 图书管理系统课设(C# + Mysql)☆13Apr 20, 2023Updated 2 years ago
- 开源GIS课程-云南大学☆25Dec 16, 2025Updated 2 months ago
- Smart Contracts for decentralized access control for IoT data using Blockchain and trusted oracles☆11Apr 14, 2019Updated 6 years ago
- ☆12Nov 14, 2024Updated last year
- Built quantitative models to measure value at risk (VaR) and Expected Shortfall (ES).☆13Aug 30, 2018Updated 7 years ago
- The source code for the monerovexplorer.com website☆16Mar 10, 2018Updated 7 years ago
- 复杂网络可视化mock工具☆13Aug 30, 2018Updated 7 years ago
- A distributed algorithm applied to the bitcoin blockchain that allows to create a new representation of the transaction - a clusterized g…☆10Feb 28, 2019Updated 6 years ago