Skip to search formSkip to main contentSkip to account menu

Deniable encryption

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
It is proposed as a novel interpretation of the notion of the shared-key deniable encryption, extended model of the coercive… 
2017
2017
This paper introduces and evaluates the performance of a novel cipher scheme, Ambiguous Multi-Symmetric Cryptography (AMSC… 
2017
2017
There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that… 
2016
2016
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the… 
2015
2015
For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is… 
2015
2015
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption… 
2015
2015
When designing a security protocol, every choice can have far-reaching repercussions. It is therefore useful to know precisely… 
2013
2013
Deniable encryption is an important that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive… 
2013
2013
Deniable encryption is an important that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive… 
2012
2012
In this paper we describe essential components of deniable cryptography. We discuss the concept of plausibility and determine the…