Timed encryption with application to deniable key exchange
From MaRDI portal
Publication:477191
DOI10.1016/J.TCS.2014.02.005zbMATH Open1350.94040OpenAlexW2172945572WikidataQ123266339 ScholiaQ123266339MaRDI QIDQ477191FDOQ477191
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.02.005
Cites Work
- Probabilistic encryption
- Time-Specific Encryption
- New directions in cryptography
- Title not available (Why is that?)
- Identity-Based Encryption from the Weil Pairing
- Title not available (Why is that?)
- Foundations of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Concurrent zero-knowledge
- Advances in Cryptology - CRYPTO 2003
- New approaches for deniable authentication
- Deniable Authentication on the Internet
- Title not available (Why is that?)
- Title not available (Why is that?)
- Conditional Oblivious Transfer and Timed-Release Encryption
- Timed-Release and Key-Insulated Public Key Encryption
- Deniable Internet Key Exchange
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- Title not available (Why is that?)
- Information and Communications Security
- Errors in Computational Complexity Proofs for Protocols
- Information Security
- Financial Cryptography and Data Security
Cited In (3)
This page was built for publication: Timed encryption with application to deniable key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477191)