Search

Your search keyword '"Chosen-plaintext attack"' showing total 129 results

Search Constraints

Start Over You searched for: Descriptor "Chosen-plaintext attack" Remove constraint Descriptor: "Chosen-plaintext attack" Topic theoretical computer science Remove constraint Topic: theoretical computer science
129 results on '"Chosen-plaintext attack"'

Search Results

1. Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map

2. Hierarchical identity-based inner product functional encryption

3. Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach

4. Breaking the hardness assumption and IND‐CPA security of HQC submitted to NIST PQC project

5. Privacy-preserving range query over multi-source electronic health records in public clouds

6. Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups

7. Secure and Efficient Compressed Sensing-Based Encryption With Sparse Matrices

8. Improvement of an outsourced attribute-based encryption scheme

9. An Efficient Ciphertext Policy Attribute-Based Encryption Scheme from Lattices and Its Implementation

10. Privacy Preserving Strong Simulation Queries on Large Graphs

11. Anti-leakage Mutable Order Preserving Distribution Encoding

12. Relationships Between Quantum IND-CPA Notions

13. Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters

14. Cryptanalysis and Improvement of the Image Encryption Scheme Based on 2D Logistic-Adjusted-Sine Map

15. Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map

16. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

17. Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation

18. Cryptanalysis and Improvement of the Hyper-Chaotic Image Encryption Scheme Based on DNA Encoding and Scrambling

19. Compressive sensing based image compression-encryption using Novel 1D-Chaotic map

20. Securing image information using double random phase encoding and parallel compressive sensing with updated sampling processes

21. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications

22. An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks

23. An Efficient Lattice-Based IBE Scheme Using Combined Public Key

24. Enhanced Scrambled Prime Key Encryption Using Chaos Theory and Steganography

25. IND-secure quantum symmetric encryption based on point obfuscation

26. <tex-math notation='LaTeX'>$2DCrypt$ </tex-math> : Image Scaling and Cropping in Encrypted Domains

27. Almost-Tight Identity Based Encryption Against Selective Opening Attack

28. Cryptanalysis of a CP-ABE scheme with policy in normal forms

29. Symbolic Encryption with Pseudorandom Keys

30. Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices Under Weak Security Model

31. Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting

32. Block encryption of quantum messages

33. Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices

34. More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing

35. Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure

36. Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing

37. Breaking an image encryption scheme based on a spatiotemporal chaotic system

38. Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform

39. Identity-based signcryption from lattices

40. Lattice-based multi-use unidirectional proxy re-encryption

41. Full secure identity-based encryption scheme with short public key size over lattices in the standard model

42. A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems

43. A novel chaotic block image encryption algorithm based on dynamic random growth technique

44. Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices

45. MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy

46. Security analysis of Yu-CaO neural networks scheme

47. LSSS Matrix-Based Attribute-Based Encryption on Lattices

48. Toward Proxy Re-encryption From Learning with Errors in the Exponent

49. Privacy preserved aid-verification attribute based signature scheme

50. Double-image encryption using discrete fractional random transform and logistic maps

Catalog

Books, media, physical & digital resources