Timed encryption with application to deniable key exchange
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 2009959 (Why is no real title available?)
- scientific article; zbMATH DE number 1759782 (Why is no real title available?)
- scientific article; zbMATH DE number 1775406 (Why is no real title available?)
- scientific article; zbMATH DE number 1775426 (Why is no real title available?)
- scientific article; zbMATH DE number 1775427 (Why is no real title available?)
- scientific article; zbMATH DE number 2085217 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- Concurrent zero-knowledge
- Conditional Oblivious Transfer and Timed-Release Encryption
- Deniable Authentication on the Internet
- Deniable internet key exchange
- Errors in Computational Complexity Proofs for Protocols
- Financial Cryptography and Data Security
- Foundations of Cryptography
- Identity-Based Encryption from the Weil Pairing
- Information Security
- Information and Communications Security
- New approaches for deniable authentication
- New directions in cryptography
- Probabilistic encryption
- Time-specific encryption
- Timed-Release and Key-Insulated Public Key Encryption
Cited in
(5)
This page was built for publication: Timed encryption with application to deniable key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477191)