Search

Your search keyword '"Deterministic encryption"' showing total 53 results

Search Constraints

Start Over You searched for: Descriptor "Deterministic encryption" Remove constraint Descriptor: "Deterministic encryption" Publisher acm Remove constraint Publisher: acm
53 results on '"Deterministic encryption"'

Search Results

1. Quantifying Information Leakage of Deterministic Encryption

2. Cryptanalysis of Comparable Encryption in SIGMOD'16

3. Ring-LWE Ciphertext Compression and Error Correction

4. Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size

5. High-Performance and Lightweight Lattice-Based Public-Key Encryption

6. Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security

7. Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption

8. Implementation of Modified RSA Cryptosystem for Data Encryption and Decryption based on n Prime number and Bit Stuffing

9. Inference Attacks on Property-Preserving Encrypted Databases

10. Make Your Query Anonymous With Oblivious Transfer

11. A Novel Encryption Algorithm Using Chaotic Lorenz Attractor and Knights Tour

12. Disavowable Public Key Encryption with Non-interactive Opening

13. Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext

14. Searchable Encryption with Secure and Efficient Updates

15. A New Additive Homomorphic Encryption based on the co-ACD Problem

16. POSTER

17. Optimal Average-Complexity Ideal-Security Order-Preserving Encryption

18. Controlled Functional Encryption

19. Multi-recipient encryption, revisited

20. An efficient image homomorphic encryption scheme with small ciphertext expansion

21. Expressive search on encrypted data

22. Proof of plaintext knowledge for code-based public-key encryption revisited

23. Barriers in cryptography with weak, correlated and leaky sources

24. Chaotic image encryption on GPU

25. Ciphertext policy attribute-based encryption from lattices

26. Poster

27. Identity-based online/offline key encapsulation and encryption

28. Compact identity-based encryption without strong symmetric cipher

29. Worry-free encryption

30. On efficient ciphertext-policy attribute based encryption and broadcast encryption

31. Practical ID-based encryption for wireless sensor network

32. Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem

33. Secure anonymous database search

34. Fully homomorphic encryption using ideal lattices

35. Improved searchable public key encryption with designated tester

36. Provably secure and efficient bounded ciphertext policy attribute based encryption

37. Comparison of MPEG video encryption algorithms

38. Attribute-based encryption with non-monotonic access structures

39. Provably secure ciphertext policy ABE

40. Security under key-dependent inputs

41. New constructions of fuzzy identity-based encryption

42. Efficient and secure self-escrowed public-key infrastructures

43. Secure information flow with random assignment and encryption

44. Attribute-based encryption for fine-grained access control of encrypted data

45. Policy-based encryption schemes from bilinear pairings

46. Efficient and provably secure ciphers for storage device block level encryption

47. On the security of a clipped hopfield neural network-based cryptosystem

48. Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption

49. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

50. Brief announcement

Catalog

Books, media, physical & digital resources