Search

Your search keyword '"Plaintext-aware encryption"' showing total 504 results

Search Constraints

Start Over You searched for: Descriptor "Plaintext-aware encryption" Remove constraint Descriptor: "Plaintext-aware encryption" Search Limiters Full Text Remove constraint Search Limiters: Full Text
504 results on '"Plaintext-aware encryption"'

Search Results

1. Image Encryption Techniques Using Fractal Function : A Review

2. On the Security of a Variant of ElGamal Encryption Scheme

3. κ-Lookback random-based text encryption technique

4. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

5. Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group

6. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

7. A Generic Scheme of plaintext-checkable database encryption

8. Leveled Homomorphic Encryption in Certificateless Cryptosystem

9. Preserving Encryption Based Data Search

11. Efficient and secure identity-based encryption scheme with equality test in cloud computing

13. Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems

14. Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman

15. Improved, black-box, non-malleable encryption from semantic security

16. Commentary on 'A block chaotic image encryption scheme based on self-adaptive modelling' [Applied Soft Computing 22 (2014) 351–357]

17. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

18. Computational friendly attribute-based encryptions with short ciphertext

19. Secure image encryption algorithm design using a novel chaos based S-Box

20. Security enhancement for AES encrypted speech in communications

21. Chosen ciphertext attack on ZHFE

22. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things

23. Improvement of Advanced Encryption Standard Algorithm With Shift Row and S.Box Modification Mapping in Mix Column

24. An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices

25. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model

26. Certificateless encryption secure against selective opening attack

27. New application of partitioning methodology: identity-based dual receiver encryption

28. Reproducible Circularly Secure Bit Encryption: Applications and Realizations

29. An approach for security of color image data in coordinate, geometric, and frequency domains

30. A novel approach for privacy homomorphism using attribute-based encryption

31. Efficient Adaptively Secure IBBE From the SXDH Assumption

32. An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs

33. Identity-based proxy re-encryption version 2: Making mobile access easy in cloud

34. Cryptanalysis of McEliece cryptosystem variants based on quasi‐cyclic low‐density parity check codes

35. Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$ 2 k -th Power Residue Symbols

36. Matrix Encryption Scheme

37. Dual Modulus RSA Based on Jordan-totient Function

38. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

39. Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption

40. Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme

41. Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability

42. Efficient dynamic threshold identity-based encryption with constant-size ciphertext

43. A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle

44. Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme

45. AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection

46. Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption**The work was, in part, supported by a McKenzie Fellowship, ARC grant LP130100605, and Defence Science and Technology Group through the Research Agreement My IP:6288

47. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

48. Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES

49. Attribute-Based Encryption for Circuits

50. Many-to-one homomorphic encryption scheme

Catalog

Books, media, physical & digital resources