Popular repositories Loading
-
False-Bottom-Encryption-Deniable-Encryption-from-Secret-Sharing
False-Bottom-Encryption-Deniable-Encryption-from-Secret-Sharing PublicFalse Bottom Encryption constructs a symmetric scheme (in the sense of using the same key to encrypt and decrypt) that shares the properties of both honey encryption and deniable encryption.
Jupyter Notebook 1
-
Control-Flow-Protection-by-Cryptographic-Instruction-Chaining
Control-Flow-Protection-by-Cryptographic-Instruction-Chaining PublicA secure execution environment using a unified cryptographic approach. It ensures instruction confidentiality, integrity, and enforced execution order via a novel key chaining mechanism. Supports s…
Jupyter Notebook 1
-
How-to-plausibly-deny-steganographic-secrets
How-to-plausibly-deny-steganographic-secrets PublicWe introduce the notion of oblivious secret sharing as an enhancement of (conventional) secret sharing with the added possibility of (plausibly) denying that some shares even exist.
Jupyter Notebook
If the problem persists, check the GitHub status page or contact support.