Search

Your search keyword '"56-bit encryption"' showing total 2,025 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption"
2,025 results on '"56-bit encryption"'

Search Results

151. AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection

152. Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption**The work was, in part, supported by a McKenzie Fellowship, ARC grant LP130100605, and Defence Science and Technology Group through the Research Agreement My IP:6288

153. FPGA Implementation of Non-Linear Cryptography

154. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

155. An Enhanced Image Encryption Scheme using 16 Byte Key

156. Revocable Quantum Timed-Release Encryption

157. Dual trapdoor identity-based encryption with keyword search

158. Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs

159. WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

160. Data Security and Privacy in Cloud Computing Using Different Encryption Algorithms

161. On Ends-to-Ends Encryption

162. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography\ud

163. On the security of a class of diffusion mechanisms for image encryption

164. Securely outsourcing the ciphertext-policy attribute-based encryption

165. AES datapath optimization strategies for low-power low-energy multisecurity-level internet-of-things applications

166. A Secure Encryption/Decryption Technique using Transcendental Number

167. Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network

168. Properties of gsw and their applications

169. A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

170. Efficient selective image encryption

171. The image encryption algorithm with plaintext-related shuffling

172. Efficient and secure multi-functional searchable symmetric encryption schemes

173. Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption

174. Physical layer encryption scheme using finite‐length polar codes

175. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption

176. Attacks on the Authenticated Encryption Mode of Operation PAE

177. Parallel search over encrypted data under attribute based encryption on the Cloud Computing

178. A novel authenticated encryption scheme and its extension

179. Fully secure anonymous spatial encryption under affine space delegation functionality revisited

180. A shareable keyword search over encrypted data in cloud computing

181. A Systematic Assessment of the Security of Full Disk Encryption

182. Simple Matrix – A Multivariate Public Key Cryptosystem (MPKC) for Encryption

183. Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search

184. Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme

185. A Modified Advanced Encryption Standard Algorithm for Image Encryption

186. Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys: TABLE 1

187. XOR Encryption Versus Phase Encryption, an In-Depth Analysis

188. Symmetric searchable encryption with efficient range query using multi-layered linked chains

189. An Efficient Hardware Implementation of Lightweight Block Cipher LEA-128/192/256 for IoT Security Applications

190. Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

191. A Secure Reconfigurable Crypto IC With Countermeasures Against SPA, DPA, and EMA

192. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

193. Substring-Searchable Symmetric Encryption

194. SKENO: Secret key encryption with non-interactive opening

195. Cryptanalysis of chosen symmetric homomorphic schemes

196. Data Security using Compression and Cryptography Techniques

197. Secure Cloud Computing with RC4 Encryption and Attack Detection Mechanism

198. An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes

199. An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks

200. Anonymous protocols: Notions and equivalence

Catalog

Books, media, physical & digital resources