For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is computationally indistinguishable from the cryptogram produced by some… (More)
The paper proposes justification of using Mersenne primes in the following cryptoschemes: commutative and publickey encryption algorithms and zero-knowledge protocol. The cryptoschemes are based on… (More)
The aim of the paper is providing resistance of the deniable encryption protocols to coercive attacks at which coercer has possibility to cause repeated encryption of the same input messages and/or… (More)
The paper proposes a new method for designing deniable encryption protocols characterized in using RSA-like probabilistic public-key encryption algorithms. Sender-, receiver-, and bi-deniable… (More)