Search

Your search keyword '"Plaintext-aware encryption"' showing total 858 results

Search Constraints

Start Over You searched for: "Plaintext-aware encryption" Remove constraint "Plaintext-aware encryption" Topic theoretical computer science Remove constraint Topic: theoretical computer science
858 results on '"Plaintext-aware encryption"'

Search Results

1. Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption

2. Security Models and Proof Strategies for Plaintext-Aware Encryption

3. Image Encryption Techniques Using Fractal Function : A Review

4. On the Security of a Variant of ElGamal Encryption Scheme

5. κ-Lookback random-based text encryption technique

6. Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group

7. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

8. A Generic Scheme of plaintext-checkable database encryption

9. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map

10. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption

11. Image encryption using partitioned cellular automata

12. Leveled Homomorphic Encryption in Certificateless Cryptosystem

14. Preserving Encryption Based Data Search

16. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys

17. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation

18. Efficient and secure identity-based encryption scheme with equality test in cloud computing

19. RSA-A Symmetric Key Cryptosystem

20. Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems

21. Incremental Deterministic Public-Key Encryption

22. A plaintext-related image encryption algorithm based on chaos

23. No embedding: A novel image cryptosystem for meaningful encryption

24. Joint image compression and encryption based on order-8 alternating transforms

25. Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman

26. A novel color image encryption scheme using DNA permutation based on the Lorenz system

27. Improved, black-box, non-malleable encryption from semantic security

28. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption

29. Commentary on 'A block chaotic image encryption scheme based on self-adaptive modelling' [Applied Soft Computing 22 (2014) 351–357]

30. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation

31. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

32. Computational friendly attribute-based encryptions with short ciphertext

33. Indistinguishability of Compressed Encryption With Circulant Matrices for Wireless Security

34. Secure image encryption algorithm design using a novel chaos based S-Box

35. Efficient Chosen-Ciphertext Secure Encryption from R-LWE

36. A new quantum algorithm for computing RSA ciphertext period

37. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

38. Chosen ciphertext attack on ZHFE

39. Constructing Subspace Membership Encryption through Inner Product Encryption

40. An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices

41. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model

42. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms

43. New application of partitioning methodology: identity-based dual receiver encryption

44. A new ElGamal-like cryptosystem based on matrices over groupring

45. Reproducible Circularly Secure Bit Encryption: Applications and Realizations

46. Amplitude-phase retrieval attack free image encryption based on two random masks and interference

47. An enhanced sub-image encryption method

48. An approach for security of color image data in coordinate, geometric, and frequency domains

49. A novel image encryption scheme based on substitution-permutation network and chaos

50. A novel approach for privacy homomorphism using attribute-based encryption

Catalog

Books, media, physical & digital resources