Search

Your search keyword '"Chosen-plaintext attack"' showing total 556 results

Search Constraints

Start Over You searched for: Descriptor "Chosen-plaintext attack" Remove constraint Descriptor: "Chosen-plaintext attack"
556 results on '"Chosen-plaintext attack"'

Search Results

1. Cryptanalyzing an Image Encryption Scheme Using Synchronization of Memristor Chaotic Systems.

2. Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme

3. Security analysis of a color image encryption based on bit-level and chaotic map.

4. Cryptanalysis of a color image encryption using minimax differential evolution-based 7D hyper-chaotic map.

5. On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding.

7. Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm.

8. Cryptanalysis and improvement of an image encryption algorithm based on chaotic and Latin square.

9. Cryptanalysis on a permutation–rewriting– diffusion (PRD) structure image encryption scheme.

10. Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map.

11. Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments.

12. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos.

13. Cryptanalysis of A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm: A Chosen Ciphertext Attack

14. Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps

15. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system

16. Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes

17. Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding

18. Cryptanalysis and Improvement of Novel Image Encryption Technique Using Hybrid Method of Discrete Dynamical Chaotic Maps and Brownian Motion.

19. Cryptanalyzing Two Image Encryption Algorithms Based on a First-Order Time-Delay System.

20. Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross‑chaotic map.

21. Quantum security of Grain-128/Grain-128a stream cipher against HHL algorithm.

22. Cryptanalzing a Novel Hyper-Chaotic Image Encryption Scheme Based on Pixel-Level Filtering and DNA-Level Diffusion

23. An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box

24. 一种基于复合混沌序列的图像加密算法安全分析.

25. Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map.

26. Cryptanalysis of an embedded systems' image encryption.

27. Breaking an image encryption scheme based on Arnold map and Lucas series.

28. Security analysis of an audio data encryption scheme based on key chaining and DNA encoding.

29. A Plain-Image-Related Chaotic Image Encryption Algorithm Based on DNA Sequence Operation and Discrete Logarithm

30. Cryptanalysis of a Novel Bit-Level Color Image Encryption Using Improved 1D Chaotic Map

31. Plaintext-Related Image Encryption Algorithm Based on Block Structure and Five-Dimensional Chaotic Map

32. Cracking and Improvement of an Image Encryption Algorithm Based on Bit-Level Permutation and Chaotic System

33. On the Security of Chaos-Based Watermarking Scheme for Secure Communication

34. Subtleties in Security Definitions for Predicate Encryption with Public Index

35. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system.

36. Cryptanalysis of a Bilateral-Diffusion image encryption algorithm based on dynamical compound chaos.

37. Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing.

38. Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm.

39. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table.

40. Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled Sine map.

41. Cryptanalysis of a New Color Image Encryption Using Combination of the 1D Chaotic Map.

42. Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013

43. Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata

44. Cryptanalysis of a New Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps

45. EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem

46. An Efficient Chosen-Plaintext Attack on an Image Fusion Encryption Algorithm Based on DNA Operation and Hyperchaos

48. Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain.

49. Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion.

50. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos

Catalog

Books, media, physical & digital resources