Stream deniable-encryption algorithms
From MaRDI portal
Recommendations
- Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
- No-key protocol for deniable encryption
- Deniable encryption with negligible detection probability: an interactive construction
- Practical Deniable Encryption
- Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
Cited in
(8)- Post-quantum no-key protocol
- A plausibly deniable encryption scheme utilizing PUF's thermo-sensitivity
- Pattern matching in encrypted stream from inner product encryption
- A novel stream encryption scheme with avalanche effect
- No-key protocol for deniable encryption
- Cryptography with Streaming Algorithms
- Stream Ciphers
- Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
This page was built for publication: Stream deniable-encryption algorithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1650351)