Search

Showing total 13 results

Search Constraints

Start Over You searched for: Topic cyberterrorism Remove constraint Topic: cyberterrorism Topic data encryption Remove constraint Topic: data encryption Journal computer journal Remove constraint Journal: computer journal
13 results

Search Results

1. SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders.

2. On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme.

3. Insecurity of ‘Improved Anonymous Multi-Receiver Identity-Based Encryption’.

4. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.

5. Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.

6. A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES.

7. Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.

8. Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.

9. Cryptanalysis of WG Family of Stream Ciphers.

10. Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.

11. RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.

12. Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.

13. Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure.