Search

Your search keyword '"Plaintext"' showing total 3,586 results

Search Constraints

Start Over You searched for: Descriptor "Plaintext" Remove constraint Descriptor: "Plaintext" Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
3,586 results on '"Plaintext"'

Search Results

1. Indefinite with Respect to Topics and Applications

2. An Overview of Data Security Algorithms in Cloud Computing

3. Taxonomy of Image Encryption Techniques - A Survey

5. Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.

7. Lightweight Cryptography for Resource Constrained Devices

9. Analysis of the Beaufort Cipher Expansion Technique and Its Usage in Providing Data Security in Cloud

10. Data Encryption and Decryption Techniques Using Line Graphs

11. Implementation of Encryption Techniques in Secure Communication Model

12. Towards a Symmetric Crypto Algorithm: The HAJ

14. Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment

15. Encryption using semigroup action

18. Symmetric Key Encryption Technique: A Cellular Automata Based Approach

20. New approach for attack of permutation-based image encryption schemes.

23. Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging

25. How to encrypt a graph.

26. Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud

27. Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems

28. An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm

29. TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support

30. Big-data driven approaches in materials science on cloud storage API through optimal homomorphic encryption

31. Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks

32. A block encryption algorithm based on exponentiation transform

33. Double‐image asymmetric cryptosystem using cylindrical diffraction and spectrum fusion and compression.

34. Cryptanalysis of some stream ciphers based on n-ary groupoids.

35. Plaintext recovery attack on 3DES algorithm with different byte keys.

36. Optimized deep neural network for cryptanalysis of DES.

37. Cryptography and Network Security: A Historical Transformation.

38. A block encryption algorithm based on exponentiation transform.

40. CRiPT: Cryptography in Penetration Testing

41. Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing

42. VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things

43. Proposed new modification of AES algorithm for data security

44. Revocable Attribute-Based Encryption With Data Integrity in Clouds

46. Information Leakage from Optical Emanations

47. Heterogeneous Signcryption Scheme From IBC to PKI With Equality Test for WBANs

48. Modified honey encryption scheme for encoding natural language message.

49. هجوم الصندوق الأسود لمحاكاة أنظمة التشفير الانسيابي باستخدام المعرف العصبي

50. Privacy-Preserving Collaborative Analytics on Medical Time Series Data

Catalog

Books, media, physical & digital resources