Skip to content
View shahzadssg's full-sized avatar
  • Johannes Kepler University
  • Austria

Block or report shahzadssg

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. False-Bottom-Encryption-Deniable-Encryption-from-Secret-Sharing False-Bottom-Encryption-Deniable-Encryption-from-Secret-Sharing Public

    False Bottom Encryption constructs a symmetric scheme (in the sense of using the same key to encrypt and decrypt) that shares the properties of both honey encryption and deniable encryption.

    Jupyter Notebook 1

  2. Control-Flow-Protection-by-Cryptographic-Instruction-Chaining Control-Flow-Protection-by-Cryptographic-Instruction-Chaining Public

    A secure execution environment using a unified cryptographic approach. It ensures instruction confidentiality, integrity, and enforced execution order via a novel key chaining mechanism. Supports s…

    Jupyter Notebook 1

  3. Cryptographic-Prevention-of-Adversarial-Out-of-Order-Execution Cryptographic-Prevention-of-Adversarial-Out-of-Order-Execution Public

    Our work introduces a novel cryptographic framework that enforces strict instruction sequencing, providing a comprehensive defence against both control flow manipulation and speculative execution v…

    1

  4. How-to-plausibly-deny-steganographic-secrets How-to-plausibly-deny-steganographic-secrets Public

    We introduce the notion of oblivious secret sharing as an enhancement of (conventional) secret sharing with the added possibility of (plausibly) denying that some shares even exist.

    Jupyter Notebook

  5. Invisible-Encryption Invisible-Encryption Public

    Invisible Encryption is a cryptographic tool designed to enable covert and undetectable communication. It integrates threshold secret sharing, steganography, and hybrid public-key encryption to emb…

    Jupyter Notebook