Search

Your search keyword '"Chosen-plaintext attack"' showing total 558 results

Search Constraints

Start Over You searched for: Descriptor "Chosen-plaintext attack" Remove constraint Descriptor: "Chosen-plaintext attack"
558 results on '"Chosen-plaintext attack"'

Search Results

51. On the Cryptanalysis of a Latin Cubes-Based Image Cryptosystem

52. Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding

53. Cryptanalysis of a New Color Image Encryption Using Combination of the 1D Chaotic Map

54. A Block Cipher Mode of Operation with Two Keys

55. Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model

56. Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit

57. Cryptanalysis of Permutation–Diffusion-Based Lightweight Chaotic Image Encryption Scheme Using CPA.

58. Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system.

60. DOAS: Efficient data owner authorized search over encrypted cloud data.

61. Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network.

62. Cryptanalyzing an image encryption based on a modified Henon map using hybrid chaotic shift transform.

63. Hierarchical identity-based inner product functional encryption

64. Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map

65. Evaluation of effectiveness of chosen-plaintext attacks on the Rao-Nam cryptosystem over a finite Abelian group

66. Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption

67. An IND-CCA2 Secure Certificateless Hybrid Signcryption

68. Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter.

69. Non-square colour image scrambling based on two-dimensional Sine-Logistic and Hénon map.

70. Cryptanalysis of a DNA and chaos based image encryption algorithm.

71. Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.

72. Cryptanalysis of an Image Encryption Algorithm Based on DNA Sequence Operation and Hyper-chaotic System.

73. Access control based privacy preserving secure data sharing with hidden access policies in cloud.

74. Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme.

75. Commentary on “A block chaotic image encryption scheme based on self-adaptive modelling” [Applied Soft Computing 22 (2014) 351–357].

76. Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach

77. CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage

78. Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes

79. Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage

80. Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding

81. Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps

82. BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT

83. P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption

84. Breaking the hardness assumption and IND‐CPA security of HQC submitted to NIST PQC project

85. Novel encryption technique for security enhancement in optical code division multiple access

86. Fingerprint-related chaotic image encryption scheme based on blockchain framework

87. Security Estimates of a Ring-Lwe Symmetric Cryptosystem Against Chosen Plaintext Attack

88. Cryptanalysis of Permutation–Diffusion-Based Lightweight Chaotic Image Encryption Scheme Using CPA

89. Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps

90. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

91. Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map.

92. Cryptanalyzing a chaotic encryption algorithm for highly autocorrelated data.

93. Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.

94. Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.

95. Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.

96. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging.

97. Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack.

98. Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion

99. Multimedia access control with secure provenance in fog-cloud computing networks

100. Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures

Catalog

Books, media, physical & digital resources