nedeljkovignjevic / secret-sharingView external linksLinks
Image and text encryption using Shamir's Secret Sharing algorithm
☆14Feb 17, 2020Updated 5 years ago
Alternatives and similar repositories for secret-sharing
Users that are interested in secret-sharing are comparing it to the libraries listed below
Sorting:
- Using convolutional neural network and MNIST dataset to recognize handwritten digits☆10Jun 12, 2020Updated 5 years ago
- spot is an open source driver assistance system for handmade toy car.☆10Jan 27, 2022Updated 4 years ago
- Mini RISC-V toolchain for Linux consisting of compiler, simulator and disassembler.☆12Sep 29, 2022Updated 3 years ago
- Implementation of checkers (draughts) strategy board game with AI based bot☆15Apr 12, 2020Updated 5 years ago
- Minmax (minimax) algorithm with Alpha-Beta (𝛼−𝛽, ab) Pruning optimization for the Checkers (Draughts) game in Python 3. Same minimax al…☆21Dec 19, 2020Updated 5 years ago
- Rewrite (https://github.com/EOSIO/eosio-project-boilerplate-simple) to Vue.js☆13Jan 4, 2019Updated 7 years ago
- Web version of my graph-algorithms-visualization project built with React☆10Apr 23, 2024Updated last year
- Integrated development environment for i386 assembly and C programming language for Linux☆13Oct 29, 2019Updated 6 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Feb 22, 2022Updated 3 years ago
- Statically-linked deep learning library written in C++ from scratch☆12Apr 14, 2020Updated 5 years ago
- //基于golang重写区块链//☆12Aug 29, 2018Updated 7 years ago
- A chameleon hash implementation in GO☆17Jun 3, 2020Updated 5 years ago
- A game of checkers written using minmax algorithm and alpha-beta pruning.☆51Oct 3, 2024Updated last year
- Convert KeePass (KDBX) password databases to John the Ripper format. Supports KeePass 1.x, 2.x, 3.x and 4.x formats while preserving encr…☆26Dec 7, 2025Updated 2 months ago
- 变色龙哈希☆25May 11, 2021Updated 4 years ago
- My solutions for Stanford University course CS224W: Machine Learning with Graphs Fall 2021 colabs (GNN, GAT, GraphSAGE, GCN)☆30Apr 5, 2022Updated 3 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Nov 14, 2021Updated 4 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Attacks against proposed image encryption schemes☆10Apr 27, 2020Updated 5 years ago
- Steganography tools for JPEG images☆10Jul 30, 2013Updated 12 years ago
- ☆12Jul 16, 2025Updated 7 months ago
- Silvera is an tool for acceleration of development of microservice architectures https://alensuljkanovic.github.io/silvera/☆10Apr 27, 2023Updated 2 years ago
- Scripts for decoding/encoding config.bin for ZTE routers☆14Nov 12, 2022Updated 3 years ago
- SliceType: Fast Gaze Typing with a Merging Keyboard☆15Jul 8, 2019Updated 6 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- Membership Inference Attack on Federated Learning☆12Jan 14, 2022Updated 4 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Oct 25, 2019Updated 6 years ago
- Java Captcha Generator☆15May 5, 2025Updated 9 months ago
- MCSI☆13Nov 2, 2021Updated 4 years ago
- Unofficial snap repo for irfanview snap☆11Dec 1, 2025Updated 2 months ago
- Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)☆12Dec 3, 2019Updated 6 years ago
- source code of DDCTF/*CTF(starctf) challenges made by me☆12Apr 29, 2019Updated 6 years ago
- Bots for the board game quoridor implemented using four algorithms: minimax, minimax with alpha beta pruning, expectimax and monte carlo …☆13Sep 28, 2024Updated last year
- To enhance the nonlinearity of neural networks and increase their mapping abilities between the inputs and response variables, activation…☆18Feb 20, 2024Updated last year
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 4 years ago
- LSTM and Word2Vec based classification on Reuters-21578 dataset☆14Nov 21, 2022Updated 3 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆13Mar 15, 2023Updated 2 years ago
- SAP Security Research sample code to reproduce the research done in our paper "Comparing local and central differential privacy using mem…☆18May 7, 2024Updated last year