Search

Your search keyword '"Deterministic encryption"' showing total 105 results

Search Constraints

Start Over You searched for: Descriptor "Deterministic encryption" Remove constraint Descriptor: "Deterministic encryption" Language english Remove constraint Language: english
105 results on '"Deterministic encryption"'

Search Results

1. CCA-security from adaptive all-but-one lossy trapdoor functions.

2. Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

3. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions.

4. Learning with Rounding, Revisited : New Reduction, Properties and Applications

5. Incremental Deterministic Public-Key Encryption.

6. Reproducible Circularly Secure Bit Encryption: Applications and Realizations.

7. Big Data Analysis And Deterministic Encryption Challenges.

8. κ-Lookback random-based text encryption technique

9. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.

10. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.

11. More on Key Wrapping.

12. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.

13. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

14. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

15. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

16. A Key Space Enhanced Chaotic Encryption Scheme for Physical Layer Security in OFDM-PON

17. Ciphertext-Only Attack on Phase-Shifting Interferometery-Based Encryption

18. An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices

19. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

20. On the security of a class of diffusion mechanisms for image encryption

21. Securely outsourcing the ciphertext-policy attribute-based encryption

22. Indistinguishability Obfuscation from Functional Encryption

23. Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption

24. CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions

25. Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage

26. A Novel Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System and DNA Computing

27. On the power of Public-key Function-Private Functional Encryption

28. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

29. The design and implementation of hybrid RSA algorithm using a novel chaos based RNG

30. Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation

31. ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation

32. Encryption Switching Protocols

33. Three-dimensional joint transform correlator cryptosystem

34. A Novel Encryption Algorithm Based on DWT and Multichaos Mapping

35. An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One

36. DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM

37. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application

38. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

39. Stateful Identity-Based Encryption Scheme: FasterEncryption and Decryption

40. A New Chaos-Based Cryptosystem for Secure Transmitted Images

41. A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption

42. Color Image Encryption Algorithm Based on TD-ERCS System and Wavelet Neural Network

43. A Formal System for Analysis of Cryptographic encryption and Their Security properties

44. Functional Encryption and Its Impact on Cryptography

45. Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks

46. SecLoc: Encryption System Based on Compressive Sensing Measurements for Location Estimation

47. Chaotic Image Encryption Based on Running-Key Related to Plaintext

48. Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy

49. Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications

50. Leakage-Resilient Symmetric Encryption via Re-keying

Catalog

Books, media, physical & digital resources