Search

Your search keyword '"Plaintext-aware encryption"' showing total 78 results

Search Constraints

Start Over You searched for: "Plaintext-aware encryption" Remove constraint "Plaintext-aware encryption" Topic theoretical computer science Remove constraint Topic: theoretical computer science Publisher springer science and business media llc Remove constraint Publisher: springer science and business media llc
78 results on '"Plaintext-aware encryption"'

Search Results

1. Security Models and Proof Strategies for Plaintext-Aware Encryption

2. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

3. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys

4. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation

5. Incremental Deterministic Public-Key Encryption

6. A plaintext-related image encryption algorithm based on chaos

7. A novel color image encryption scheme using DNA permutation based on the Lorenz system

8. Improved, black-box, non-malleable encryption from semantic security

9. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption

10. Efficient Chosen-Ciphertext Secure Encryption from R-LWE

11. A new quantum algorithm for computing RSA ciphertext period

12. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

13. A new ElGamal-like cryptosystem based on matrices over groupring

14. Reproducible Circularly Secure Bit Encryption: Applications and Realizations

15. Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box

16. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption

17. An image encryption scheme based on chaotic tent map

18. Bit-oriented quantum public-key encryption based on quantum perfect encryption

19. A new chaos-based image encryption algorithm with dynamic key selection mechanisms

20. Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$ 2 k -th Power Residue Symbols

21. Time-specific encryption from forward-secure encryption: generic and direct constructions

22. A secure image encryption scheme based on chaotic maps and affine transformation

23. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2

24. New secure partial encryption method for medical images using graph coloring problem

25. Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

26. A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity

27. Cryptanalysis of a new image alternate encryption algorithm based on chaotic map

28. On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream

29. Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks

30. New constructions of dynamic threshold cryptosystem

31. Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system

32. Masking property of quantum random cipher with phase mask encryption

33. A Noisy Channel Tolerant Image Encryption Scheme

34. Security evaluation of bilateral-diffusion based image encryption algorithm

35. Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map

36. Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process

37. Lattice-based certificateless public-key encryption in the standard model

38. Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain

39. Efficient Linear Homomorphic Encryption from LWE Over Rings

40. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps

41. Efficient leakage-resilient public key encryption from DDH assumption

42. Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos

43. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting

44. A new construction on randomized message-locked encryption in the standard model via UCEs

45. New chaotic image encryption algorithm based on cross-mapping

46. Breaking and improving an image encryption scheme based on total shuffling scheme

47. Breaking a novel colour image encryption algorithm based on chaos

48. Puzzle - an efficient, compression independent video encryption algorithm

49. The n-Diffie–Hellman problem and multiple-key encryption

50. Lattice-based completely non-malleable public-key encryption in the standard model

Catalog

Books, media, physical & digital resources