vikas@prajapati:~$ cat profile.json{
"name" : "Vikas Prajapati",
"education" : "IIT Jammu, CS '26",
"intern" : "Tuning Bill, Jaipur",
"location" : "Jaipur, Rajasthan, IN",
"focus" : [
"Security",
"Post-Quantum Cryptography",
"Blockchain & MPC"
],
"btp" : "Quantum-Safe Video Conferencing",
"cp" : {
"codeforces" : "Vikas_Prajapati",
"leetcode" : "Vikas_Prajapati04"
}
} |
vikas@prajapati:~$ cat current_work.txt |
Quantum-resistant real-time video conferencing using NIST-standardized PQC algorithms. Kyber-768 for key exchange, Dilithium2 for signatures, AES-256 over SRTP for media β <1ms crypto overhead at 30 FPS. |
Intentionally vulnerable web app covering 7 OWASP attack vectors β built for penetration testing practice and security awareness training. Full login system with exploitable endpoints for each vulnerability. |
Wireshark-inspired CLI tool that captures and dissects live network traffic in real time. Parses Ethernet, IP, TCP, UDP, ARP, and ICMP headers with field-level human-readable output. |
A portfolio that looks and works like a real terminal CLI. Type |
A permissioned blockchain platform for registering and trading real-world assets. Built on a private multi-node blockchain with QBFT consensus β supports asset tokenization, ownership transfer, and trade lifecycle management via smart contracts. |
A threshold-based crypto wallet splitting the private key between a hot machine and a cold machine using MPC. Neither machine alone can sign a transaction β both must participate, ensuring the full key never exists in one place. |
