Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
163 | Willy Susilo, Yi Mu 0001 |
Non-interactive Deniable Ring Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 386-401, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Ring signature schemes, non-interactive, ring-to-ring authentication, deniable |
138 | Mario Di Raimondo, Rosario Gennaro |
New approaches for deniable authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 112-121, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, concurrency, zero-knowledge, deniability |
129 | Lingling Wang, Guoyin Zhang, Chunguang Ma |
ID-based deniable ring authentication with constant-size signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. China ![In: Frontiers Comput. Sci. China 2(1), pp. 106-112, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
deniable ring authentication, constant-size signature, privacy, bilinear pairings, ID-based |
121 | Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue |
Efficient Non-interactive Deniable Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 673-679, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations |
112 | Tao Feng, Fenghua Li, Jianfeng Ma 0001, Sang-Jae Moon |
A new approach for UC security concurrent deniable authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(4), pp. 352-367, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
concurrent deniable authentication, verifiably smooth projective hashing, the decisional composite residuosity assumption, information security, universally composable |
112 | Jun Furukawa 0001, Kaoru Kurosawa, Hideki Imai |
An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 46-57, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
constant-round, resettable zero-knowledge, the random oracle model, resettably-sound argument of knowledge, ?-protocol, efficient, deniable |
104 | Shaoquan Jiang |
Deniable Authentication on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 298-312, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Protocol, Key Exchange, Deniability |
95 | Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Practical Deniable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFSEM ![In: SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008, Proceedings, pp. 599-609, 2008, Springer, 978-3-540-77565-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
deniable encryption |
87 | Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su |
Group Oriented Deniable Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 89-92, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
87 | Willy Susilo, Yi Mu 0001 |
Deniable Ring Authentication Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 149-163, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
78 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 68-80, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
70 | Wei-Min Shi |
ID-Based Non-interactive Deniable Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 479-482, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
70 | Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk |
Deniable authentication and key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 400-409, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, key exchange, deniability |
70 | Ya-Fen Chang, Chin-Chen Chang 0001, Chia-Lin Kao |
An improvement on a deniable authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(3), pp. 65-74, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
70 | Moni Naor |
Deniable Ring Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 481-498, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
70 | Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky |
Deniable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 90-104, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
68 | Yonatan Aumann, Michael O. Rabin |
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 299-303, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
61 | Song Y. Yan, Carsten Maple, Glyn James |
A New Scheme for Deniable/Repudiable Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASC ![In: Computer Algebra in Scientific Computing, 10th International Workshop, CASC 2007, Bonn, Germany, September 16-20, 2007, Proceedings, pp. 424-432, 2007, Springer, 978-3-540-75186-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Deniable/repudiable authentication, quadratic residuosity problem, intractability |
59 | Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 |
Some Observations on Zap and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 180-193, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability |
55 | Bartosz Oler, Imed El Fray |
Deniable File System--Application of Deniable Storage to Protection of Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, Elk, Poland, June 28-30, 2007, pp. 225-229, 2007, IEEE Computer Society, 0-7695-2894-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Shaoquan Jiang, Reihaneh Safavi-Naini |
An Efficient Deniable Key Exchange Protocol (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 47-52, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Chunbo Ma, Jun Ao, Jianhua Li 0001 |
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (15) ![In: Online Communities and Social Computing, Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 124-133, 2007, Springer, 978-3-540-73256-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Chameleon, Authentication, Key Agreement, Deniability |
53 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
An Efficient ID-Based Deniable Authentication Protocol from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 388-391, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An efficient deniable authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore, pp. 307-310, 2005, IEEE Computer Society, 0-7695-2378-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, cryptography |
53 | Matthew K. Franklin, Tomas Sander |
Commital Deniable Proofs and Electronic Campaign Finance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 373-387, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
51 | Rafael Pass |
On Deniability in the Common Reference String and Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 316-337, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Adam L. Young, Moti Yung |
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 224-235, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption |
36 | Meng-Hui Lim, Sanggon Lee, Youngho Park 0005, Hoonjae Lee 0001 |
An Enhanced ID-Based Deniable Authentication Protocol on Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 1008-1017, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura |
Toward the Fair Anonymous Signatures: Deniable Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 174-191, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Yi Mu 0001, Fangguo Zhang, Willy Susilo |
Deniable Partial Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings, pp. 182-194, 2004, Springer, 3-540-24087-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Colin Boyd, Wenbo Mao, Kenneth G. Paterson |
Deniable Authenticated Key Establishment for Internet Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 255-271, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Cynthia Dwork, Moni Naor, Amit Sahai |
Concurrent zero-knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 51(6), pp. 851-898, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
composition, cryptographic protocols, Zero knowledge |
34 | Jonathan Katz |
Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 211-228, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Cynthia Dwork, Moni Naor |
Zaps and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA, pp. 283-293, 2000, IEEE Computer Society, 0-7695-0850-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
zap, witness-indistinguishable protocol, shared random string model, verifiable pseudo-random bit generators, concurrent deniable authentication, computational complexity, cryptography, NP completeness, theorem proving, public keys, zero-knowledge proofs, verifier, concurrent zero knowledge |
25 | Ran Canetti, Rosario Gennaro |
Incoercible Multiparty Computation (extended abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 37th Annual Symposium on Foundations of Computer Science, FOCS '96, Burlington, Vermont, USA, 14-16 October, 1996, pp. 504-513, 1996, IEEE Computer Society, 0-8186-7594-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
incoercible multiparty computation, secure multiparty protocols, coercion resilience, computationally bounded adversaries, public communication channels, adaptive security problem, deniable encryptions, protocols, trapdoor permutations |
19 | SK Hafizul Islam, Krittibas Parai, Daya Sagar Gupta |
PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 238, pp. 110113, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Johannes Müller 0001, Balázs Pejó, Ivan Pryvalov |
DeVoS: Deniable Yet Verifiable Vote Updating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2024(1), pp. 357-378, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau |
NOTRY: Deniable messaging with retroactive avowal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2024(2), pp. 391-411, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Yanmei Cao, Jianghong Wei, Yang Xiang 0001, Willy Susilo, Xiaofeng Chen 0001 |
Abuse-resistant deniable encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 87, pp. 103761, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Niusen Chen, Bo Chen 0028 |
HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 1483-1495, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Collins 0001, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay |
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 120, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
19 | Chloe Tergiman, Marie-Claire Villeval |
The Way People Lie in Markets: Detectable vs. Deniable Lies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Manag. Sci. ![In: Manag. Sci. 69(6), pp. 3340-3357, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Gabrielle Beck, Arka Rai Choudhuri, Matthew Green 0001, Abhishek Jain 0002, Pratyush Ranjan Tiwari |
Time-Deniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2023(3), pp. 79-102, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shahzad Ahmad, Stefan Rass, Peter Schartner |
False-Bottom Encryption: Deniable Encryption From Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 62549-62564, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito |
Deniable Authentication when Signing Keys Leak. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 213, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Johannes Mueller 0001, Balazs Pejo, Ivan Pryvalov |
DeVoS: Deniable Yet Verifiable Vote Updating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1616, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang |
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 705, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Daniel Hugenroth, Alberto Sonnino, Sam Cutler, Alastair R. Beresford |
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1792, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau |
NOTRY: deniable messaging with retroactive avowal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1926, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Yiling Chen, Yuanzhi Yao, Nenghai Yu |
Image Translation-Based Deniable Encryption against Model Extraction Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: IEEE International Conference on Image Processing, ICIP 2023, Kuala Lumpur, Malaysia, October 8-11, 2023, pp. 1330-1334, 2023, IEEE, 978-1-7281-9835-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jeroen van Wier, Arash Atashpendar, Peter B. Rønne |
Deniable Public-Key Authenticated Quantum Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecITC ![In: Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers, pp. 97-112, 2023, Springer, 978-3-031-52946-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Anrin Chakraborti, Darius Suciu, Radu Sion |
Wink: Deniable Secure Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 1271-1288, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Kaiming Chen, Atsuko Miyaji, Yuntao Wang 0002 |
Privacy-Enhanced Anonymous and Deniable Post-quantum X3DH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SciSec ![In: Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings, pp. 157-177, 2023, Springer, 978-3-031-45932-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Tengjun Liu, Ying Chen, Wanxuan Gu |
Deniable Diffusion Generative Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: IEEE International Conference on Multimedia and Expo, ICME 2023, Brisbane, Australia, July 10-14, 2023, pp. 67-71, 2023, IEEE, 978-1-6654-6891-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito |
Deniable Authentication When Signing Keys Leak. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (3) ![In: Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part III, pp. 69-100, 2023, Springer, 978-3-031-30619-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang |
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (1) ![In: Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I, pp. 24-44, 2023, Springer, 978-3-031-50593-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Chen Chen 0057, Xiao Liang 0014, Bogdan Carbunar, Radu Sion |
SoK: Plausibly Deniable Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2022(2), pp. 132-151, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest |
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 35(3), pp. 17, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Keisuke Hara, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka |
Generic transformation from broadcast encryption to round-optimal deniable ring authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 90(2), pp. 277-316, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Emmanuel Ahene, Joojo Walker, Ikram Ali, Kwame Ofosuhene Peasah, Michael Asante |
Efficient deniable authentication and its application in location-based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 100, pp. 107958, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yanmei Cao, Jianghong Wei, Fangguo Zhang, Yang Xiang 0001, Xiaofeng Chen 0001 |
Efficient public-key authenticated deniable encryption schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 82, pp. 103620, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Shengke Zeng, Hongjie Zhang, Fei Hao 0001, Hongwei Li 0001 |
Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 16(2), pp. 1729-1738, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Anrin Chakraborti, Darius Suciu, Radu Sion |
Wink: Deniable Secure Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.08891, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang 0001, Jian Weng 0001 |
Deniable Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.12587, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Peng Jiang, Baoqi Qiu, Liehuang Zhu |
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 17, pp. 1597-1609, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Gabrielle Beck, Arka Rai Choudhuri, Matthew Green 0001, Abhishek Jain 0002, Pratyush Ranjan Tiwari |
Time-Deniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1018, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Shaoquan Jiang, Yeow Meng Chee, San Ling, Huaxiong Wang, Chaoping Xing |
A new framework for deniable secure key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. ![In: Inf. Comput. 285(Part), pp. 104866, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Niusen Chen, Bo Chen 0028, Weisong Shi |
A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings, pp. 150-169, 2022, Springer, 978-3-031-25537-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jacqueline Brendel, Rune Fiedler, Felix Günther 0001, Christian Janson, Douglas Stebila |
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II, pp. 3-34, 2022, Springer, 978-3-030-97130-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Andrea Coladangelo, Shafi Goldwasser, Umesh V. Vazirani |
Deniable encryption in a Quantum world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022, pp. 1378-1391, 2022, ACM, 978-1-4503-9264-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz |
How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings, pp. 253-269, 2022, Springer, 978-3-031-22294-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Austen Barker |
Artifice: A Design for Usable Deniable Storage Informed by Adversary Threat ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
19 | Po-Wen Chi, Ming-Hung Wang |
Deniable search of encrypted cloud-storage data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 58, pp. 102806, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Huiwen Jia, Chunming Tang 0003 |
Cryptanalysis of a non-interactive deniable ring signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 20(1), pp. 103-112, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Hiroaki Anada, Yoshifumi Ueshige |
Anonymous Deniable Predicate Authentication Scheme with Revocability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 11(3), pp. 1-15, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Kyle Fredrickson, Austen Barker, Darrell D. E. Long |
A Multiple Snapshot Attack on Deniable Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.04618, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Andrea Coladangelo, Shafi Goldwasser, Umesh V. Vazirani |
Deniable Encryption in a Quantum World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2112.14988, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Chen Chen 0057, Xiao Liang 0014, Bogdan Carbunar, Radu Sion |
SoK: Plausibly Deniable Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.12809, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Po-Wen Chi, Yu-Lun Chang |
Do not ask me what I am looking for: Index deniable encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 122, pp. 28-39, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Huiwen Jia, Chunming Tang 0003, Yanhua Zhang |
Lattice-Based Logarithmic-Size Non-Interactive Deniable Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 23(8), pp. 980, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Chen Chen 0057, Xiao Liang 0014, Bogdan Carbunar, Radu Sion |
SoK: Plausibly Deniable Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1547, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Jacqueline Brendel, Rune Fiedler, Felix Günther 0001, Christian Janson, Douglas Stebila |
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 769, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest |
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 616, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Amit Sahai, Brent Waters |
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Comput. ![In: SIAM J. Comput. 50(3), pp. 857-908, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Kyle Fredrickson, Austen Barker, Darrell D. E. Long |
A Multiple Snapshot Attack on Deniable Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2021, Houston, TX, USA, November 3-5, 2021, pp. 1-8, 2021, IEEE, 978-1-6654-5838-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Ari Moesriami Barmawi, Asep Rizal Nurjaman |
Strengthening the Security of Deniable Authentication Scheme Using Zero-Knowledge Proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNS ![In: ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021, pp. 27-34, 2021, ACM, 978-1-4503-8642-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Chen Chen 0057, Anrin Chakraborti, Radu Sion |
PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pp. 1109-1126, 2021, USENIX Association, 978-1-939133-24-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest |
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II, pp. 410-440, 2021, Springer, 978-3-030-75247-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Andreas Hülsing, Florian Weber |
Epochal Signatures for Deniable Group Chats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021, pp. 1677-1695, 2021, IEEE, 978-1-7281-8935-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jinghui Liao, Bo Chen, Weisong Shi |
TrustZone Enhanced Plausibly Deniable Encryption System for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: 6th IEEE/ACM Symposium on Edge Computing, SEC 2021, San Jose, CA, USA, December 14-17, 2021, pp. 441-447, 2021, IEEE, 978-1-4503-8390-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Shweta Agrawal, Shafi Goldwasser, Saleet Mossel |
Deniable Fully Homomorphic Encryption from Learning with Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![In: Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II, pp. 641-670, 2021, Springer, 978-3-030-84244-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jayaprakash Kar |
Provably secure certificateless deniable authenticated encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 54, pp. 102581, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Daya Sagar Gupta, SK Hafizul Islam, Mohammad S. Obaidat, Kuei-Fang Hsiao |
A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Sens. Wirel. Networks ![In: Ad Hoc Sens. Wirel. Networks 47(1-4), pp. 227-247, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Shengke Zeng, Yi Mu 0001, Hongjie Zhang, Mingxing He |
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 516, pp. 331-345, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Chen Chen 0057, Anrin Chakraborti, Radu Sion |
INFUSE: Invisible plausibly-deniable file system for NAND flash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2020(4), pp. 239-254, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Chen Chen 0057, Anrin Chakraborti, Radu Sion |
PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.02011, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Bo Chen |
Towards Designing A Secure Plausibly Deniable System for Mobile Devices against Multi-snapshot Adversaries - A Preliminary Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.02379, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Andreas Hülsing, Florian Weber |
Epochal Signatures for Deniable Group Chats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1138, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Shweta Agrawal, Shafi Goldwasser, Saleet Mossel |
Deniable Fully Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1588, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Kashi Neupane |
Long-Term Secure Deniable Group Key Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECITC ![In: Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers, pp. 242-256, 2020, Springer, 978-3-030-69254-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|