Skip to search formSkip to main contentSkip to account menu

Secure voice

Known as: Ciphony, Voice privacy, Voice encryption 
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Highly Cited
2012
Voice conversion technique, which modifies one speaker's (source) voice to sound like another speaker (target), presents a threat… 
Highly Cited
2012
Highly Cited
2012
For searchable symmetric encryption schemes (or symmetric-key encryption with keyword search), the security against passive… 
2009
2009
Purpose – The purpose of this paper is to set out and justify a broader, systemic typology that encompasses, and is built around… 
Highly Cited
2003
Highly Cited
2003
Most current spoken-dialog systems only extract sequences of words from a speaker's voice. This largely ignores other useful… 
Review
2003
Review
2003
Achieving effective real-time voice communication over an ad hoc network of mobile wireless nodes is an important new challenge… 
Highly Cited
2002
Highly Cited
2002
In this paper, we show that the natural and most common way of implementing modes of operation for cryptographic primitives often… 
1994
1994
Key exchange schemes such as Diffie Hellman are vulnerable to middleperson attacks, and thus are often augmented by means of… 
Highly Cited
1977
Highly Cited
1977
In recent years, very important progress was made in both real-time digital computer communication and real-time digital voice…