{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:43Z","timestamp":1762004983897,"version":"3.37.3"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T00:00:00Z","timestamp":1524528000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"by Russian Foundation for Basic Research","award":["#18-57-54002"],"award-info":[{"award-number":["#18-57-54002"]}]},{"name":"by VietNam Academy of Science and Technology","award":["#QTRU01.08\/18-19"],"award-info":[{"award-number":["#QTRU01.08\/18-19"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s12652-018-0791-6","type":"journal-article","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T06:02:24Z","timestamp":1524549744000},"page":"1977-1984","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Pseudo-probabilistic block ciphers and their randomization"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2214-3005","authenticated-orcid":false,"given":"Moldovyan Nikolay","family":"Andreevich","sequence":"first","affiliation":[]},{"given":"Moldovyan Alexander","family":"Andreevich","sequence":"additional","affiliation":[]},{"given":"Tam Nguyen","family":"Duc","sequence":"additional","affiliation":[]},{"given":"Hai Nguyen","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Manh Cong","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Minh Nguyen","family":"Hieu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,24]]},"reference":[{"issue":"9","key":"791_CR1","doi-asserted-by":"publisher","first-page":"3231","DOI":"10.3837\/tiis.2014.09.016","volume":"8","author":"TM Barakat","year":"2014","unstructured":"Barakat TM (2014) A new sender-side public-key deniable encryption scheme with fast decryption. KSII Trans Internet Inf Syst 8(9):3231\u20133249. \n                    https:\/\/doi.org\/10.3837\/tiis.2014.09.016","journal-title":"KSII Trans Internet Inf Syst"},{"key":"791_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/BFb0052229","volume-title":"Advances in cryptology\u2014CRYPTO \u201997","author":"R Canetti","year":"1997","unstructured":"Canetti R, Dwork C, Naor M, Ostrovsky R (1997) Deniable encryption. In: Kaliski BS (ed) Advances in cryptology\u2014CRYPTO \u201997. Springer, Berlin, pp 90\u2013104. \n                    https:\/\/doi.org\/10.1007\/BFb0052229"},{"key":"791_CR3","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1007\/978-3-642-20465-4_33","volume-title":"Advances in cryptology\u2014EUROCRYPT 2011","author":"M D\u00fcrmuth","year":"2011","unstructured":"D\u00fcrmuth M, Freeman DM (2011) Deniable encryption with negligible detection probability: an interactive construction. In: Paterson KG (ed) Advances in cryptology\u2014EUROCRYPT 2011. Springer, Berlin, pp 610\u2013626. \n                    https:\/\/doi.org\/10.1007\/978-3-642-20465-4_33"},{"key":"791_CR4","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-642-20465-4_23","volume-title":"Advances in cryptology\u2014EUROCRYPT 2011","author":"Y Ishai","year":"2011","unstructured":"Ishai Y, Kushilevitz E, Ostrovsky R, Prabhakaran M, Sahai A (2011) Efficient non-interactive secure computation. In: Paterson KG (ed) Advances in cryptology\u2014EUROCRYPT 2011. Springer, Berlin, pp 406\u2013425. \n                    https:\/\/doi.org\/10.1007\/978-3-642-20465-4_23"},{"issue":"5","key":"791_CR5","doi-asserted-by":"publisher","first-page":"370","DOI":"10.4304\/jnw.4.5.370-377","volume":"4","author":"B Meng","year":"2009","unstructured":"Meng B (2009) A secure internet voting protocol based on non-interactive deniable authentication protocol and proof protocol that two ciphertexts are encryption of the same plaintext. J Netw 4(5):370\u2013377. \n                    https:\/\/doi.org\/10.4304\/jnw.4.5.370-377","journal-title":"J Netw"},{"key":"791_CR7","volume-title":"Innovative cryptography (programming series)","author":"NA Moldovyan","year":"2006","unstructured":"Moldovyan NA, Moldovyan AA (2006) Innovative cryptography (programming series). Charles River Media Inc, Rockland"},{"key":"791_CR8","doi-asserted-by":"publisher","DOI":"10.1201\/9781420054125","volume-title":"Data-driven block ciphers for fast telecommunication systems","author":"NA Moldovyan","year":"2007","unstructured":"Moldovyan NA, Moldovyan AA (2007) Data-driven block ciphers for fast telecommunication systems, 1st edn. Auerbach Publications, Boca Raton","edition":"1"},{"key":"791_CR6","first-page":"318","volume":"I","author":"AA Moldovyan","year":"2015","unstructured":"Moldovyan AA, Moldovyan DN, Shcherbacov VA (2015) Stream deniable-encryption algorithm satisfying criterion of the computational indistinguishability from probabilistic ciphering. Workshop Found Inf I:318\u2013330","journal-title":"Workshop Found Inf"},{"issue":"1(70)","key":"791_CR9","first-page":"68","volume":"24","author":"NA Moldovyan","year":"2016","unstructured":"Moldovyan NA, Moldovyan AA, Moldovyan DN, Shcherbacov VA (2016) Stream deniable\u2013encryption algorithms. Comput Sci J Moldova 24(1(70)):68\u201382","journal-title":"Comput Sci J Moldova"},{"key":"791_CR10","unstructured":"Moldovyan NA, Shcherbacov VA, Eremeev MA (2017) Deniable encryption protocols based on commutative ciphers. Quasigroups Relat Syst:95\u2013108."},{"key":"791_CR11","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-642-22792-9_30","volume-title":"Advances in cryptology\u2014CRYPTO 2011","author":"A O\u2019Neill","year":"2011","unstructured":"O\u2019Neill A, Peikert C, Waters B (2011) Bi-deniable public-key encryption. In: Rogaway P (ed) Advances in cryptology\u2014CRYPTO 2011. Springer, Berlin, pp 525\u2013542. \n                    https:\/\/doi.org\/10.1007\/978-3-642-22792-9_30"},{"key":"791_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of computer security","author":"J Pieprzyk","year":"2002","unstructured":"Pieprzyk J, Hardjono T, Seberry J (2002) Fundamentals of computer security. Springer, Berlin. \n                    https:\/\/doi.org\/10.1007\/978-3-662-07324-7"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0791-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-0791-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0791-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T19:16:43Z","timestamp":1556047003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-0791-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,24]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["791"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-0791-6","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2018,4,24]]},"assertion":[{"value":"26 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}