Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/646762.706165guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Deniable Encryption

Published: 17 August 1997 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2021)Fuzzy Message DetectionProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484545(1507-1528)Online publication date: 12-Nov-2021
  • (2019)enClosureProceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3307334.3326101(353-365)Online publication date: 12-Jun-2019
  • (2019)Leakage Resilience from Program ObfuscationJournal of Cryptology10.1007/s00145-018-9286-z32:3(742-824)Online publication date: 1-Jul-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
August 1997
537 pages
ISBN:3540633847

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 17 August 1997

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Fuzzy Message DetectionProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484545(1507-1528)Online publication date: 12-Nov-2021
  • (2019)enClosureProceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3307334.3326101(353-365)Online publication date: 12-Jun-2019
  • (2019)Leakage Resilience from Program ObfuscationJournal of Cryptology10.1007/s00145-018-9286-z32:3(742-824)Online publication date: 1-Jul-2019
  • (2018)User-friendly deniable storage for mobile devicesComputers and Security10.1016/j.cose.2017.09.00572:C(163-174)Online publication date: 1-Jan-2018
  • (2017)Deniable Encryption Protocols Based on Probabilistic Public-Key EncryptionProceedings of the 20th Conference of Open Innovations Association FRUCT10.23919/FRUCT.2017.8071324(284-289)Online publication date: 10-Apr-2017
  • (2017)Trust but VerifyProceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3081333.3081342(464-474)Online publication date: 16-Jun-2017
  • (2017)Constraining Pseudorandom Functions PrivatelyProceedings, Part II, of the 20th IACR International Conference on Public-Key Cryptography --- PKC 2017 - Volume 1017510.1007/978-3-662-54388-7_17(494-524)Online publication date: 28-Mar-2017
  • (2016)Deniable Encryption using One Time PadsProceedings of the International Conference on Advances in Information Communication Technology & Computing10.1145/2979779.2979828(1-5)Online publication date: 12-Aug-2016
  • (2016)VOTORProceedings of the Australasian Computer Science Week Multiconference10.1145/2843043.2843362(1-13)Online publication date: 1-Feb-2016
  • (2016)Selective Opening Security from Simulatable Data EncapsulationProceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 1003210.1007/978-3-662-53890-6_9(248-277)Online publication date: 4-Dec-2016
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media