Deniable Encryption using One Time Pads
暂无分享,去创建一个
[1] Bo Meng,et al. An Efficient Receiver Deniable Encryption Scheme and Its Applications , 2010, J. Networks.
[2] Markus Dürmuth,et al. Deniable Encryption with Negligible Detection Probability: An Interactive Construction , 2011, EUROCRYPT.
[3] Marek Klonowski,et al. Practical Deniable Encryption , 2008, SOFSEM.
[4] Shin-Jia Hwang,et al. Confidential deniable authentication using promised signcryption , 2011, J. Syst. Softw..
[5] Salil P. Vadhan,et al. Theory of Cryptography , 2016, Lecture Notes in Computer Science.
[6] Saikat Basu,et al. Sender-Side Public Key Deniable Encryption Scheme , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[7] Bo Meng,et al. A Receiver Deniable Encryption Scheme , 2009 .
[8] Frank Rubin,et al. One-Time Pad Cryptography , 1996, Cryptologia.
[9] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings , 1997, CRYPTO 1997.
[10] Dongqing Xie,et al. Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack , 2012, ISPEC.
[11] Claudio Orlandi,et al. Lower and Upper Bounds for Deniable Public-Key Encryption , 2011, ASIACRYPT.
[12] Maged Hamada Ibrahim,et al. A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..
[13] A. N. Berezin,et al. Stream deniable-encryption computationally indistinguishable from probabilistic ciphering , 2015, 2015 XVIII International Conference on Soft Computing and Measurements (SCM).
[14] Dongqing Xie,et al. Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[15] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[16] Brent Waters,et al. Bi-Deniable Public-Key Encryption , 2011, CRYPTO.
[17] Xiaotie Deng,et al. Deniable authentication protocols , 2001 .
[18] Yonatan Aumann,et al. Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract) , 1998, CRYPTO.
[19] Rafael Pass,et al. On Constant-Round Concurrent Zero-Knowledge , 2008, TCC.
[20] Hugo Krawczyk. Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings , 1998, CRYPTO.
[21] Phillip Rogaway. Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings , 2011, CRYPTO.
[22] Ran Canetti. Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008 , 2008, TCC.