Security Memo

Search (Ctrl+K)

SearchSearch

Recent Notes

  • SMART

    Oct 22, 2024

    • software
  • Bossa Nova

    Oct 22, 2024

    • ZFS

      Oct 22, 2024

      • post-rock

        Oct 06, 2024

        • concept
      • 2024-09-27

        Sep 27, 2024

        • daily

      See 1423 more sorted by tag →

      Home

      ❯

      Literature

      ❯

      How to use indistinguishability obfuscation: deniable encryption, and more

      How to use indistinguishability obfuscation: deniable encryption, and more

      created Feb 22, 2024updated May 26, 20241 min read

      • literature

      Metadata

      • Source
      • File: How to use indistinguishability obfuscation by Sahai, Waters (2013).pdf
      • Zotero: View Item
      • Type: Document
      • Title: How to use indistinguishability obfuscation: deniable encryption, and more,
      • Author: Sahai, Amit; Waters, Brent;
      • Year: 2013

      Abstract

      Tags and Collections

      • Keywords: 02 Next; Cryptography; Deniable Encryption

      Comments

      https://eprint.iacr.org/2013/454

      Annotations

      Notes

      Graph View

      • Annotations
      • Notes

      Backlinks

      • No backlinks found

      Created with Quartz v4.2.3 © 2024

      • GitHub
      • LinkedIn
      • HackTheBox