Search

Your search keyword '"Plaintext-aware encryption"' showing total 1,370 results

Search Constraints

Start Over You searched for: Descriptor "Plaintext-aware encryption" Remove constraint Descriptor: "Plaintext-aware encryption"
1,370 results on '"Plaintext-aware encryption"'

Search Results

1. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

2. Image Encryption Techniques Using Fractal Function : A Review

3. On the Security of a Variant of ElGamal Encryption Scheme

4. κ-Lookback random-based text encryption technique

5. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

6. Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group

7. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

8. A Generic Scheme of plaintext-checkable database encryption

9. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map

10. Cryptanalysis and security improvement for a symmetric color image encryption algorithm

11. Security Models and Proof Strategies for Plaintext-Aware Encryption.

12. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption

13. Image encryption using partitioned cellular automata

14. An optimal approach for watermarking using MRC4 encryption scheme

15. Leveled Homomorphic Encryption in Certificateless Cryptosystem

17. Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption

18. Preserving Encryption Based Data Search

20. Medical image encryption based on improved ElGamal encryption technique

21. Modified optical asymmetric image cryptosystem based on coherent superposition and equal modulus decomposition

22. Cryptanalysis of a DNA and chaos based image encryption algorithm

23. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys

24. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation

25. Efficient and secure identity-based encryption scheme with equality test in cloud computing

27. Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications

28. Demonstration and a practical scheme of the optical asymmetric cryptosystem

29. RSA-A Symmetric Key Cryptosystem

30. Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems

31. Incremental Deterministic Public-Key Encryption

32. A plaintext-related image encryption algorithm based on chaos

33. No embedding: A novel image cryptosystem for meaningful encryption

34. Security analysis of a novel fusion encryption algorithm based on dna sequence operation and hyper-chaotic system

35. Joint image compression and encryption based on order-8 alternating transforms

36. Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman

37. A novel color image encryption scheme using DNA permutation based on the Lorenz system

38. Improved, black-box, non-malleable encryption from semantic security

39. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption

40. Commentary on 'A block chaotic image encryption scheme based on self-adaptive modelling' [Applied Soft Computing 22 (2014) 351–357]

41. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation

42. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

43. Computational friendly attribute-based encryptions with short ciphertext

44. Indistinguishability of Compressed Encryption With Circulant Matrices for Wireless Security

45. Secure image encryption algorithm design using a novel chaos based S-Box

46. Efficient Chosen-Ciphertext Secure Encryption from R-LWE

47. Security enhancement for AES encrypted speech in communications

48. A new quantum algorithm for computing RSA ciphertext period

49. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

50. Chosen ciphertext attack on ZHFE

Catalog

Books, media, physical & digital resources