no code implementations • 13 Oct 2021 • Luke A. Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler, Thomas Shrimpton
State of the art generative models of human-produced content are the focus of many recent papers that explore their use for steganographic communication.
1 code implementation • 3 May 2019 • Joseph I. Choi, Dave 'Jing' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor
We describe SGX-enabled SFE protocols (modeling the enclave as an oracle), and formalize the strongest-possible notion of 2P-SFE for our setting.
Cryptography and Security
no code implementations • 13 May 2016 • Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton
In this survey, we give an overview of network traffic obfuscation and its role in circumventing Internet censorship.
Networking and Internet Architecture Cryptography and Security C.2