Search

Your search keyword '"40-bit encryption"' showing total 2,998 results

Search Constraints

Start Over You searched for: Descriptor "40-bit encryption" Remove constraint Descriptor: "40-bit encryption"
2,998 results on '"40-bit encryption"'

Search Results

1. Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption

2. Flexible Wildcard Searchable Encryption System

3. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

4. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data

5. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

6. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

7. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

8. Correlation power analysis of modes of encryption in AES and its countermeasures

9. A hybrid framework of data hiding and encryption in H.264/SVC

10. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

11. Audit-Free Cloud Storage via Deniable Attribute-Based Encryption

12. Chaotic Searchable Encryption for Mobile Cloud Storage

13. Medical image encryption using high-speed scrambling and pixel adaptive diffusion

14. A Generic Scheme of plaintext-checkable database encryption

15. Identity-based broadcast encryption with continuous leakage resilience

16. Cryptanalysis and security improvement for a symmetric color image encryption algorithm

17. Image encryption using partitioned cellular automata

18. Attribute‐based broadcast encryption scheme for lightweight devices

19. An encryption algorithm based on combined chaos in body area networks

20. Shifted Adaption Homomorphism Encryption for Mobile and Cloud Learning

21. Color image encryption based on chaotic systems and elliptic curve ElGamal scheme

22. An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System

23. Efficient Polar Code-Based Physical Layer Encryption Scheme

24. Secure data-sharing using distributed environmental matching keys

25. Efficient Anonymous Multireceiver Certificateless Encryption

26. Public key encryption resilient to leakage and tampering attacks

27. Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption

28. A novel scheme for image encryption using substitution box and chaotic system

29. Criteria-Based Encryption

31. FPGA implementation of an optimized key expansion module of AES algorithm for secure transmission of personal ECG signals

32. Secure and private control using semi-homomorphic encryption

33. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

34. Cryptanalysis of a DNA and chaos based image encryption algorithm

35. A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm

36. A novel method in audio message encryption based on a mixture of chaos function

37. ENHANCE THE DATA SECURITY BY CHANGINGTHE ENCRYPTION TECHNIQUE BASED ON DATA PATTERN IN BLOCK BASED PRIVATE KEY DATA ENCRYPTION

38. Data Sharing in Cloud Computing Based On Attribute Based Encryption System

39. An Efficient Key Policy Attribute Based Encryption Scheme In Cloud Computing

40. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation

41. An efficient symmetric image encryption algorithm based on an intertwining logistic map

42. Efficient and secure identity-based encryption scheme with equality test in cloud computing

43. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

44. Data Control in Cloud Based Encryption

45. Secured Transmission of Text using Double Encryption Algorithms

46. A novel approach based on stream cipher for selective speech encryption

47. A New Secure Hybrid Algorithm for QR-Code Images Encryption and Steganography

48. Secured Cloud Storage via Attribute-based Encryption

49. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

50. Video Encryption Algorithm and Key Management using Perfect Shuffle

Catalog

Books, media, physical & digital resources