Search

Your search keyword '"56-bit encryption"' showing total 226 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
226 results on '"56-bit encryption"'

Search Results

1. Functional Encryption for Inner Product with Full Function Privacy

2. Fast Software Encryption

3. Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles

4. Practical Order-Revealing Encryption with Limited Leakage

5. Big-Key Symmetric Encryption: Resisting Key Exfiltration

6. CCA-Secure Keyed-Fully Homomorphic Encryption

7. A Design of Dual Encryption Based on Data Obfuscation and Mutual Authentication in the Smart-Grid Environment

8. Selective Opening Security for Receivers

9. From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes

10. How Secure is Deterministic Encryption?

11. KDM-CCA Security from RKA Secure Authenticated Encryption

12. RDEA: A Novel Video Encryption Algorithm

13. Adaptive Witness Encryption and Asymmetric Password-Based Cryptography

14. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting

15. Fast Software Encryption

16. Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack

17. Introduction to Attribute Based Searchable Encryption

18. General Impossibility of Group Homomorphic Encryption in the Quantum World

19. A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

20. On Minimal Assumptions for Sender-Deniable Public Key Encryption

21. Online/Offline Attribute-Based Encryption

22. A Simple Lightweight Encryption Scheme for Wireless Sensor Networks

23. Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors

24. Expressive Cryptography: Lattice Perspectives

25. Radio Frequency Identification

26. Cryptanalysis of the OKH Authenticated Encryption Scheme

27. Forward-Secure Hierarchical Predicate Encryption

28. ECC-Based Image Encryption Using Code Computing

29. Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption

30. Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking

31. Functional Encryption from (Small) Hardware Tokens

32. On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices

33. Financial Cryptography and Data Security

34. A Specific Encryption Solution for Data Warehouses

35. Limits of Provable Security for Homomorphic Encryption

36. Toward Practical Searchable Symmetric Encryption

37. Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited

38. Function-Private Subspace-Membership Encryption and Its Applications

39. Public-Key Encryption

40. Public Key Encryption with Multi-keyword Search

41. Fast Software Encryption

42. Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes

43. Incremental Deterministic Public-Key Encryption

44. On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers

45. A General Construction for Multi-authority Attribute-Based Encryption

46. Research and Implementation of File Encryption and Decryption

47. Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

48. On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification

49. High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller

50. A New Encryption Method for Secured Message Passing by Sorting Technique

Catalog

Books, media, physical & digital resources