Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,715,842 papers from all fields of science
Search
Sign In
Create Free Account
Deniable encryption
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Alice and Bob
BestCrypt
Block cipher
Chaffing and winnowing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering
N. Moldovyan
,
Ahmed Al-Majmar Nashwan
,
D. Nguyen
,
N. Nguyen
,
Hieu Minh Nguyen
2018
Corpus ID: 196017730
It is proposed as a novel interpretation of the notion of the shared-key deniable encryption, extended model of the coercive…
Expand
2017
2017
Ambiguous Multi-Symmetric Scheme and Applications
Richard Bassous
,
A. Mansour
,
Roger Bassous
,
Huirong Fu
,
Ye Zhu
,
George P. Corser
2017
Corpus ID: 29916601
This paper introduces and evaluates the performance of a novel cipher scheme, Ambiguous Multi-Symmetric Cryptography (AMSC…
Expand
2017
2017
Method for Pseudo-probabilistic Block Encryption
N. Moldovyan
,
A. Moldovyan
,
D. Nguyen
,
H. Nam
,
M. Hieu
International Conference on Industrial Networks…
2017
Corpus ID: 58461858
There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that…
Expand
2016
2016
Stream Deniable-Encryption Algorithms
N. Moldovyan
,
A. Moldovyan
,
D. Moldovyan
,
V. Shcherbacov
Comput. Sci. J. Moldova
2016
Corpus ID: 1668002
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the…
Expand
2015
2015
Stream deniable-encryption computationally indistinguishable from probabilistic ciphering
A. N. Berezin
,
A. Moldovyan
,
N. A. Moldovyan
System Configuration Management
2015
Corpus ID: 19055535
For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is…
Expand
2015
2015
Provably sender-deniable encryption scheme
N. Moldovyan
,
A. Moldovyan
,
Victor Scerbacov
Comput. Sci. J. Moldova
2015
Corpus ID: 22610668
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption…
Expand
2015
2015
Static Protocols and Deniability
Katriel Cohn-Gordon
2015
Corpus ID: 202773478
When designing a security protocol, every choice can have far-reaching repercussions. It is therefore useful to know precisely…
Expand
2013
2013
Deniable Encryption Key
K. Reddy
,
B. Reddy
2013
Corpus ID: 61912977
Deniable encryption is an important that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive…
Expand
2013
2013
Deniable Encryption Key P
L. K. Reddy
,
B. B. Reddy
,
S. Krishna
2013
Corpus ID: 16387624
Deniable encryption is an important that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive…
Expand
2012
2012
Desirable features for plausibly deniable encryption
Björgvin Ragnarsson
,
G. Toth
,
Hanieh Bagheri
,
W. Minnaard
2012
Corpus ID: 53971051
In this paper we describe essential components of deniable cryptography. We discuss the concept of plausibility and determine the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE