Search

Your search keyword '"Deterministic encryption"' showing total 1,858 results

Search Constraints

Start Over You searched for: Descriptor "Deterministic encryption" Remove constraint Descriptor: "Deterministic encryption"
1,858 results on '"Deterministic encryption"'

Search Results

1. CCA-security from adaptive all-but-one lossy trapdoor functions.

2. Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

3. TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing

4. Reproducible Circularly-Secure Bit Encryption: Applications and Realizations

5. Random-Oracle Uninstantiability from Indistinguishability Obfuscation

6. Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model

7. All-but-One Dual Projective Hashing and Its Applications

8. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions.

9. Learning with Rounding, Revisited : New Reduction, Properties and Applications

10. Stronger Security Model for Public-Key Encryption with Equality Test

11. Length-Doubling Ciphers and Tweakable Ciphers

12. Correlated Product Security from Any One-Way Function

13. Incremental Deterministic Public-Key Encryption.

14. More on Key Wrapping

15. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE

16. Reproducible Circularly Secure Bit Encryption: Applications and Realizations.

17. How to Enrich the Message Space of a Cipher

18. Image Encryption Techniques Using Fractal Function : A Review

19. Big Data Analysis And Deterministic Encryption Challenges.

20. Information Leakage in Encrypted Deduplication via Frequency Analysis

21. Fair Data Transactions Across Private Databases

22. CCA-security from adaptive all-but-one lossy trapdoor functions

23. Indistinguishability and Non-deterministic Encryption of the Quantum Safe Multivariate Polynomial Public Key Cryptographic System

24. Periodical key change for cloud mutable security protocol

25. On the Security of a Variant of ElGamal Encryption Scheme

26. Reversible cellular automata image encryption for similarity search

27. Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

28. κ-Lookback random-based text encryption technique

29. Chaos-based image encryption using vertical-cavity surface-emitting lasers

30. On Selective-Opening Security of Deterministic Primitives

31. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.

32. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.

33. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

34. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

35. A Secure Model to Execute Queries Over Encrypted Databases in the Cloud

36. Quantifying Information Leakage of Deterministic Encryption

37. Chaotic synchronization cryptosystems combined with RSA encryption algorithm

38. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

39. An efficient RSA-based certificateless public key encryption scheme

40. A combination chaotic system and application in color image encryption

41. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

42. A Secure Image Encryption Scheme using Chaos and Wavelet Transformations

43. Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators

44. A Generic Scheme of plaintext-checkable database encryption

45. Eliminating the texture features in visually meaningful cipher images

46. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map

47. A memristor-based chaotic system and its application in image encryption

48. Cryptanalysis and security improvement for a symmetric color image encryption algorithm

49. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption

50. Image encryption using partitioned cellular automata

Catalog

Books, media, physical & digital resources