메뉴 건너뛰기




Volumn 4910 LNCS, Issue , 2008, Pages 599-609

Practical deniable encryption

Author keywords

Deniable encryption

Indexed keywords

COMPUTER SCIENCE; DATA STORAGE EQUIPMENT; LAW ENFORCEMENT; SECURITY OF DATA;

EID: 38549145955     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77566-9_52     Document Type: Conference Paper
Times cited : (47)

References (14)
  • 1
    • 84955579478 scopus 로고    scopus 로고
    • The Newton channel
    • Anderson, R.J, ed, Information Hiding, Springer, Heidelberg
    • Anderson, R.J., Vaudenay, S., Preneel, B., Nyberg, K.: The Newton channel. In: Anderson, R.J. (ed.) Information Hiding. LNCS, vol. 1174, pp. 151-156. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1174 , pp. 151-156
    • Anderson, R.J.1    Vaudenay, S.2    Preneel, B.3    Nyberg, K.4
  • 3
    • 84958626761 scopus 로고    scopus 로고
    • Deniable encryption
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 90-104
    • Canetti, R.1    Dwork, C.2    Naor, M.3    Ostrovsky, R.4
  • 4
    • 0030416397 scopus 로고    scopus 로고
    • Incoercible multiparty computation (extended abstract). In: FOCS
    • Soc, Los Alamitos
    • Canetti, R., Gennaro, R.: Incoercible multiparty computation (extended abstract). In: FOCS, pp. 504-513. IEEE Comp. Soc, Los Alamitos (1996)
    • (1996) IEEE Comp , pp. 504-513
    • Canetti, R.1    Gennaro, R.2
  • 5
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Blakely, C.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, C.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 10-18
    • ElGamal, T.1
  • 6
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469-472 (1985)
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 7
    • 84937393537 scopus 로고    scopus 로고
    • Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystemsconversions for McEliece PKC In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 19-35. Springer, Heidelberg (2001)
    • Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystemsconversions for McEliece PKC In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19-35. Springer, Heidelberg (2001)
  • 9
    • 35048902569 scopus 로고    scopus 로고
    • A public-key encryption scheme with pseudo-random ciphertexts
    • Samarati, P, Ryan, P.Y.A, Gollmann, D, Molva, R, eds, ESORICS 2004, Springer, Heidelberg
    • Möller, B.: A public-key encryption scheme with pseudo-random ciphertexts. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 335-351. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3193 , pp. 335-351
    • Möller, B.1
  • 10
    • 79960836060 scopus 로고    scopus 로고
    • Deniable ring authentication
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Naor, M.: Deniable ring authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 481-498. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 481-498
    • Naor, M.1
  • 11
    • 4243063326 scopus 로고    scopus 로고
    • Doctoral Thesis, Royal Institute of Technology, Department of Numerical Analysis and Computing Science, Stockholm August
    • Näslund, M.: Bit Extraction, Hard-Core Predicates, and the Bit Security of RSA. Doctoral Thesis, Royal Institute of Technology, Department of Numerical Analysis and Computing Science, Stockholm (August 1998)
    • (1998) Bit Extraction, Hard-Core Predicates, and the Bit Security of RSA
    • Näslund, M.1
  • 12
    • 84957360674 scopus 로고    scopus 로고
    • Kleptography: Using cryptography against cryptography
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Young, A., Yung, M.: Kleptography: Using cryptography against cryptography. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 62-74. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 62-74
    • Young, A.1    Yung, M.2
  • 13
    • 24144478261 scopus 로고    scopus 로고
    • Young, A., Yung, M.: Malicious cryptography: Kleptographic aspects. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 7-18. Springer, Heidelberg (2005)
    • Young, A., Yung, M.: Malicious cryptography: Kleptographic aspects. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 7-18. Springer, Heidelberg (2005)
  • 14
    • 33745596392 scopus 로고    scopus 로고
    • Young, A., Yung, M.: A space efficient backdoor in RSA and its applications. In: Preneel, B., Tavares, S.E. (eds.) SAC 2005. LNCS, 3897, pp. 128-143. Springer, Heidelberg (2006)
    • Young, A., Yung, M.: A space efficient backdoor in RSA and its applications. In: Preneel, B., Tavares, S.E. (eds.) SAC 2005. LNCS, vol. 3897, pp. 128-143. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.