Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,031,098 papers from all fields of science
Search
Sign In
Create Free Account
Deniable encryption
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Alice and Bob
BestCrypt
Block cipher
Chaffing and winnowing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Deniable Encryption based on Standard RSA with OAEP
H. Yajam
,
Younes Karimi
,
M. Akhaee
International Symposium on Telecommunications
2016
Corpus ID: 38052152
There are various methods of anti-forensics many of which are simple and robust, however, some advanced techniques such as…
Expand
2016
2016
Stream Deniable-Encryption Algorithms
N. Moldovyan
,
A. Moldovyan
,
D. Moldovyan
,
V. Shcherbacov
Comput. Sci. J. Moldova
2016
Corpus ID: 1668002
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the…
Expand
2015
2015
Bi-Deniable Inner Product Encryption from LWE
Daniel Apon
,
Xiong Fan
,
Feng-Hao Liu
IACR Cryptology ePrint Archive
2015
Corpus ID: 14091591
Deniable encryption (Canetti et al. CRYPTO ’97) is an intriguing primitive that provides a security guarantee against not only…
Expand
2015
2015
Provably sender-deniable encryption scheme
N. Moldovyan
,
A. Moldovyan
,
Victor Scerbacov
Comput. Sci. J. Moldova
2015
Corpus ID: 22610668
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption…
Expand
2015
2015
Stream deniable-encryption computationally indistinguishable from probabilistic ciphering
A. N. Berezin
,
A. Moldovyan
,
N. A. Moldovyan
System Configuration Management
2015
Corpus ID: 19055535
For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is…
Expand
2012
2012
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
Chong-zhi Gao
,
Dongqing Xie
,
Baodian Wei
Information Security Practice and Experience
2012
Corpus ID: 42952237
The deniable encryption is a type of encryption which can hide the true message while revealing a fake one. Even if the sender or…
Expand
2010
2010
An Efficient Receiver Deniable Encryption Scheme and Its Applications
Bo Meng
,
JiangQing Wang
J. Networks
2010
Corpus ID: 8659639
Deniable encryption is an important cryptographic primitive, essential in all cryptographic protocols where a coercive adversary…
Expand
Highly Cited
2009
Highly Cited
2009
A Method for Obtaining Deniable Public-Key Encryption
M. Ibrahim
International Journal of Network Security
2009
Corpus ID: 16890126
Deniable encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a…
Expand
2009
2009
Receiver-deniable Public-Key Encryption
M. Ibrahim
International Journal of Network Security
2009
Corpus ID: 800013
Incoercible (or deniable) encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion…
Expand
2009
2009
A Receiver Deniable Encryption Scheme
Bo Meng
,
JiangQing Wang
2009
Corpus ID: 16380135
A practical efficient receiver deniable encryption scheme based on BCP commitment scheme and idea of Klonowski et al. is proposed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE