Popular repositories Loading
-
How-to-plausibly-deny-steganographic-secrets
How-to-plausibly-deny-steganographic-secrets PublicWe introduce the notion of oblivious secret sharing as an enhancement of (conventional) secret sharing with the added possibility of (plausibly) denying that some shares even exist.
Jupyter Notebook
-
False-Bottom-Encryption-Deniable-Encryption-from-Secret-Sharing
False-Bottom-Encryption-Deniable-Encryption-from-Secret-Sharing PublicFalse Bottom Encryption constructs a symmetric scheme (in the sense of using the same key to encrypt and decrypt) that shares the properties of both honey encryption and deniable encryption.
Jupyter Notebook
-
Control-Flow-Protection-by-Cryptographic-Instruction-Chaining
Control-Flow-Protection-by-Cryptographic-Instruction-Chaining PublicA secure execution environment using a unified cryptographic approach. It ensures instruction confidentiality, integrity, and enforced execution order via a novel key chaining mechanism. Supports s…
Jupyter Notebook
If the problem persists, check the GitHub status page or contact support.