Search

Your search keyword '"Plaintext-aware encryption"' showing total 878 results

Search Constraints

Start Over You searched for: Descriptor "Plaintext-aware encryption" Remove constraint Descriptor: "Plaintext-aware encryption" Topic computer science Remove constraint Topic: computer science
878 results on '"Plaintext-aware encryption"'

Search Results

1. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

2. Image Encryption Techniques Using Fractal Function : A Review

3. On the Security of a Variant of ElGamal Encryption Scheme

4. κ-Lookback random-based text encryption technique

5. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

6. A Generic Scheme of plaintext-checkable database encryption

7. Cryptanalysis and security improvement for a symmetric color image encryption algorithm

8. An optimal approach for watermarking using MRC4 encryption scheme

9. Leveled Homomorphic Encryption in Certificateless Cryptosystem

11. Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption

12. Preserving Encryption Based Data Search

14. Medical image encryption based on improved ElGamal encryption technique

15. Modified optical asymmetric image cryptosystem based on coherent superposition and equal modulus decomposition

16. Cryptanalysis of a DNA and chaos based image encryption algorithm

17. Efficient and secure identity-based encryption scheme with equality test in cloud computing

19. Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications

20. Demonstration and a practical scheme of the optical asymmetric cryptosystem

21. RSA-A Symmetric Key Cryptosystem

22. A plaintext-related image encryption algorithm based on chaos

23. Security analysis of a novel fusion encryption algorithm based on dna sequence operation and hyper-chaotic system

24. Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman

25. A novel color image encryption scheme using DNA permutation based on the Lorenz system

26. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption

27. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation

28. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

29. Efficient Chosen-Ciphertext Secure Encryption from R-LWE

30. Security enhancement for AES encrypted speech in communications

31. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

32. Chosen ciphertext attack on ZHFE

33. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things

34. Improvement of Advanced Encryption Standard Algorithm With Shift Row and S.Box Modification Mapping in Mix Column

35. Constructing Subspace Membership Encryption through Inner Product Encryption

36. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms

37. Cryptanalyzing a chaotic encryption algorithm for highly autocorrelated data

38. Certificateless encryption secure against selective opening attack

39. New application of partitioning methodology: identity-based dual receiver encryption

40. Reproducible Circularly Secure Bit Encryption: Applications and Realizations

41. Amplitude-phase retrieval attack free image encryption based on two random masks and interference

42. An enhanced sub-image encryption method

43. An approach for security of color image data in coordinate, geometric, and frequency domains

44. A novel approach for privacy homomorphism using attribute-based encryption

45. An efficient chaos pseudo-random number generator applied to video encryption

46. Identity-based proxy re-encryption version 2: Making mobile access easy in cloud

47. Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box

48. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

49. Breaking an image encryption algorithm based on the new substitution stage with chaotic functions

50. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Catalog

Books, media, physical & digital resources