Главная
Study mode:
on
1
black hat
2
Why listen ... to me?
3
Main Idea
4
Motivation
5
Other applications
6
Our Solution
7
What's out there?
8
Simple solution
9
Smarter solutions
10
Core Technology
11
Core Tech - Set Reconciliation
12
Core Tech - String Reconciliation
13
Implementation - Example
14
Conclusion
15
References
Description:
Explore the concept of deniable encryption in this 19-minute Black Hat conference talk. Delve into the main idea, motivation, and various applications of this technology. Learn about existing solutions, from simple to more sophisticated approaches, and understand the core technology behind set and string reconciliation. Examine an implementation example and gain insights into the potential impact of deniable encryption on digital privacy and security.

Say It Ain’t So - An Implementation of Deniable Encryption

Black Hat
Add to list
0:00 / 0:00