<--- Back to Details
First PageDocument Content
Ciphertext indistinguishability / Deniable encryption / Semantic security / Public-key cryptography / Applied mathematics / Cipher / Probabilistic encryption / Cryptography / Cyberwarfare / Security
Date: 2012-12-28 09:46:16
Ciphertext indistinguishability
Deniable encryption
Semantic security
Public-key cryptography
Applied mathematics
Cipher
Probabilistic encryption
Cryptography
Cyberwarfare
Security

On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 358,63 KB

Share Document on Facebook

Similar Documents

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability  The challenge

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

DocID: 1qLNA - View Document

Lower and Upper Bounds for Deniable Public-Key Encryption Rikke Bendlin 1,?  , Jesper Buus Nielsen

Lower and Upper Bounds for Deniable Public-Key Encryption Rikke Bendlin 1,? , Jesper Buus Nielsen

DocID: 1bTmi - View Document

Introduction to Securing Data in Transit  Jennifer Vesperman  2002−02−24 Revision History

Introduction to Securing Data in Transit Jennifer Vesperman 2002−02−24 Revision History

DocID: 18IUi - View Document

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1  Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

DocID: 16aYn - View Document

On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

DocID: 14BkL - View Document