Deniable encryption (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Deniable encryption" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
383rd place
320th place
8,888th place
6,276th place
5th place
5th place
low place
low place
low place
low place
14th place
14th place
low place
low place
5,032nd place
3,357th place
low place
low place
265th place
1,095th place
772nd place
849th place
12th place
11th place
low place
low place
2,275th place
1,288th place
193rd place
152nd place
low place
low place
1,518th place
1,072nd place
129th place
89th place
low place
low place
1,041st place
733rd place
low place
low place
3rd place
3rd place
low place
low place
1,475th place
1,188th place
low place
low place
low place
low place
low place
9,569th place
low place
low place

apnews.com

archive.today

blackhat.com

books.google.com

chiriliuc.com

adal.chiriliuc.com

coe.int

rm.coe.int

dagstuhl.de

drops.dagstuhl.de

doi.org

  • Chen, Chen; Chakraborti, Anrin; Sion, Radu (2020). "INFUSE: Invisible plausibly-deniable file system for NAND flash". Proceedings on Privacy Enhancing Technologies. 2020 (4): 239–254. doi:10.2478/popets-2020-0071. ISSN 2299-0984. Archived from the original on 2023-02-08. Retrieved 2024-04-02.
  • Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky (1996-05-10). "Deniable Encryption" (PostScript). Advances in Cryptology – CRYPTO '97. Lecture Notes in Computer Science. Vol. 1294. pp. 90–104. doi:10.1007/BFb0052229. ISBN 978-3-540-63384-6. Archived from the original on 2020-08-24. Retrieved 2007-01-05.{{cite book}}: CS1 maint: multiple names: authors list (link)
  • Ordekian, Marilyne; Atondo-Siu, Gilberto; Hutchings, Alice; Vasek, Marie (2024). "Investigating Wrench Attacks: Physical Attacks Targeting Cryptocurrency Users" (PDF). 6th Conference on Advances in Financial Technologies. Leibniz International Proceedings in Informatics (LIPIcs). 316. Schloss Dagstuhl – Leibniz-Zentrum für Informatik: 24:1–24:24. doi:10.4230/LIPIcs.AFT.2024.24. ISBN 978-3-95977-345-4. ISSN 1868-8969. Retrieved 2025-05-31.
  • Shannon, Claude (1949). "Communication Theory of Secrecy Systems" (PDF). Bell System Technical Journal. 28 (4): 659–664. doi:10.1002/j.1538-7305.1949.tb00928.x. Archived (PDF) from the original on 2022-01-14. Retrieved 2022-01-14.

embeddedsw.net

fedsoc.org

forensicfocus.com

github.com

gitlab.com

gnu.org

lists.gnu.org

groups.google.com

iacr.org

eprint.iacr.org

iq.org

legifrance.gouv.fr

marutukku.org

petsymposium.org

  • Chen, Chen; Chakraborti, Anrin; Sion, Radu (2020). "INFUSE: Invisible plausibly-deniable file system for NAND flash". Proceedings on Privacy Enhancing Technologies. 2020 (4): 239–254. doi:10.2478/popets-2020-0071. ISSN 2299-0984. Archived from the original on 2023-02-08. Retrieved 2024-04-02.

schneier.com

techworld.com

news.techworld.com

the-stationery-office.co.uk

parliament.the-stationery-office.co.uk

theguardian.com

truecrypt.org

uscourts.gov

media.ca11.uscourts.gov

  • In RE: GRAND JURY SUBPOENA DUCES TECUM, Nos. 11-12268 & 11-15421 (11th Cir. 2012-02-23) ("We hold that Doe properly invoked the Fifth Amendment privilege. In response, the Government chose not give him the immunity the Fifth Amendment and 18 U.S.C. § 6002 mandate, and the district court acquiesced. Stripped of Fifth Amendment protection, Doe refused to produce the unencrypted contents of the hard drives. The refusal was justified, and the district court erred in adjudging him in civil contempt. The district court’s judgment is accordingly REVERSED.").

virginia.edu

cs.virginia.edu

web.archive.org

wired.com

worldcat.org

search.worldcat.org

  • Chen, Chen; Chakraborti, Anrin; Sion, Radu (2020). "INFUSE: Invisible plausibly-deniable file system for NAND flash". Proceedings on Privacy Enhancing Technologies. 2020 (4): 239–254. doi:10.2478/popets-2020-0071. ISSN 2299-0984. Archived from the original on 2023-02-08. Retrieved 2024-04-02.
  • Ordekian, Marilyne; Atondo-Siu, Gilberto; Hutchings, Alice; Vasek, Marie (2024). "Investigating Wrench Attacks: Physical Attacks Targeting Cryptocurrency Users" (PDF). 6th Conference on Advances in Financial Technologies. Leibniz International Proceedings in Informatics (LIPIcs). 316. Schloss Dagstuhl – Leibniz-Zentrum für Informatik: 24:1–24:24. doi:10.4230/LIPIcs.AFT.2024.24. ISBN 978-3-95977-345-4. ISSN 1868-8969. Retrieved 2025-05-31.