Search

Your search keyword '"Deterministic encryption"' showing total 1,859 results

Search Constraints

Start Over You searched for: Descriptor "Deterministic encryption" Remove constraint Descriptor: "Deterministic encryption"
1,859 results on '"Deterministic encryption"'

Search Results

51. Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography

52. An optimal approach for watermarking using MRC4 encryption scheme

53. Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption

55. Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption

56. Preserving Encryption Based Data Search

58. Medical image encryption based on improved ElGamal encryption technique

59. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

60. Modified optical asymmetric image cryptosystem based on coherent superposition and equal modulus decomposition

63. Cryptanalysis of a DNA and chaos based image encryption algorithm

64. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys

65. Big Data Analysis And Deterministic Encryption Challenges

66. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation

67. Efficient and secure identity-based encryption scheme with equality test in cloud computing

69. An optimized DNA based encryption scheme with enforced secure key distribution

70. A multithreaded programming approach for multimedia big data: encryption system

71. Demonstration and a practical scheme of the optical asymmetric cryptosystem

72. RSA-A Symmetric Key Cryptosystem

73. Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems

74. Comparative Study of cryptographic encryption algorithms

75. Efficient designated server identity-based encryption with conjunctive keyword search

76. Incremental Deterministic Public-Key Encryption

77. A plaintext-related image encryption algorithm based on chaos

78. Double image compression and encryption scheme using logistic mapped convolution and cellular automata

79. No embedding: A novel image cryptosystem for meaningful encryption

80. Security analysis of a novel fusion encryption algorithm based on dna sequence operation and hyper-chaotic system

81. Joint image compression and encryption based on order-8 alternating transforms

82. Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman

83. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

84. A novel color image encryption scheme using DNA permutation based on the Lorenz system

85. Improved, black-box, non-malleable encryption from semantic security

86. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption

87. An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations

88. Commentary on 'A block chaotic image encryption scheme based on self-adaptive modelling' [Applied Soft Computing 22 (2014) 351–357]

89. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation

90. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

91. Computational friendly attribute-based encryptions with short ciphertext

93. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices

94. Secure image encryption algorithm design using a novel chaos based S-Box

95. Efficient Chosen-Ciphertext Secure Encryption from R-LWE

96. Indistinguishability of Compressed Encryption With Circulant Matrices for Wireless Security

97. A resource-efficient encryption algorithm for multimedia big data

98. Security enhancement for AES encrypted speech in communications

99. Chaos based adaptive double-image encryption scheme using hash function and S-boxes

100. Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain

Catalog

Books, media, physical & digital resources