Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
31
views
8
references
Top references
cited by
27
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
848
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — CRYPTO '97
Deniable Encryption
other
Author(s):
Rein Canetti
,
Cynthia Dwork
,
Moni Naor
,
Rafail Ostrovsky
Publication date
(Online):
May 17 2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
8
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A hard-core predicate for all one-way functions
O Goldreich
,
L A Levin
(1989)
0
comments
Cited
104
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Public-key cryptosystems provably secure against chosen ciphertext attacks
M. Yung
,
M Naor
(1990)
0
comments
Cited
103
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A public-key cryptosystem with worst-case/average-case equivalence
Cynthia Dwork
,
Miklos Ajtai
(1997)
0
comments
Cited
61
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1997
Publication date (Online):
May 17 2006
Pages
: 90-104
DOI:
10.1007/BFb0052229
SO-VID:
73d56062-632c-48f0-b334-a0bc7febb739
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 221
A multiplicative attack using LLL algorithm on RSA signatures with redundancy
pp. 16
Statistical zero knowledge protocols to prove modular polynomial relations
pp. 235
On the security of the KMOV public key cryptosystem
pp. 75
Plug and play encryption
pp. 90
Deniable Encryption
pp. 105
Eliminating decryption errors in the Ajtai-Dwork Cryptosystem
pp. 150
Security of blind digital signatures
pp. 180
How to sign digital streams
pp. 198
Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations
pp. 213
Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
pp. 249
A key recovery attack on discrete log-based schemes using a prime order subgroup
pp. 264
The prevalence of kleptographic attacks on discrete-log based cryptosystems
pp. 277
“Pseudo-random” number generation within cryptographic algorithms: The DDS case
pp. 292
Unconditional security against memory-bounded adversaries
pp. 307
Privacy amplification secure against active adversaries
pp. 322
Visual authentication and identification
pp. 342
Efficient algorithms for elliptic curve cryptosystems
pp. 357
An improved algorithm for arithmetic on a family of elliptic curves
pp. 425
Efficient generation of shared RSA keys
pp. 455
Towards realizing random oracles: Hash functions that hide all partial information
pp. 470
Collision-Resistant hashing: Towards making UOWHFs practical
Similar content
848
Computationally efficient deniable communication
Authors:
Qiaosheng Zhang
,
Mayank Bakshi
,
Sidharth Jaggi
On Deniability in Quantum Key Exchange
Authors:
Donald Beaver
Deniable cloud storage
Authors:
Paolo Gasti
,
Giuseppe Ateniese
,
Marina Blanton
See all similar
Cited by
27
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
Authors:
Mihir Bellare
,
Dennis Hofheinz
,
Scott Yilek
Deniable Encryption
Authors:
Rein Canetti
,
Cynthia Dwork
,
Moni Naor
…
Efficient Receipt-Free Voting Based on Homomorphic Encryption
Authors:
Martin Hirt
,
Kazue Sako
See all cited by