Search

Your search keyword '"56-bit encryption"' showing total 67 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Publisher springer science and business media llc Remove constraint Publisher: springer science and business media llc
67 results on '"56-bit encryption"'

Search Results

1. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

2. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

3. An optimized DNA based encryption scheme with enforced secure key distribution

4. A multithreaded programming approach for multimedia big data: encryption system

5. A novel location-based encryption model using fuzzy vault scheme

6. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

7. Improved, black-box, non-malleable encryption from semantic security

8. Efficient Chosen-Ciphertext Secure Encryption from R-LWE

9. A resource-efficient encryption algorithm for multimedia big data

10. Security enhancement for AES encrypted speech in communications

11. An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC video stream

12. An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption

13. Cryptographic key protection against FROST for mobile devices

14. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

15. A Secure Information Framework with APRQ Properties

16. RCB: leakage-resilient authenticated encryption via re-keying

17. Efficient public key encryption with revocable keyword search in cloud computing

18. Bit-oriented quantum public-key encryption based on quantum perfect encryption

19. Cryptanalysis of a High-Definition Image Encryption Based on AES Modification

20. Dual trapdoor identity-based encryption with keyword search

21. Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs

22. Efficient selective image encryption

23. A shareable keyword search over encrypted data in cloud computing

24. Symmetric searchable encryption with efficient range query using multi-layered linked chains

25. Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

26. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

27. An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes

28. Multimedia digital rights management based on selective encryption for flexible business model

29. Hash key-based image encryption using crossover operator and chaos

30. Cryptanalysis and security improvement for selective image encryption

31. Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model

32. A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security

33. Security analysis and improvement of a partial encryption scheme

34. On link encryption against wiretapping attack in network coding

35. Efficient leakage-resilient public key encryption from DDH assumption

36. A generic partial encryption scheme for low-power mobile devices

37. The study of selective encryption of motion vector based on the S-Box for the security improvement in the process of video

38. An Efficient Quasigroup Block Cipher

39. FPGA based simple and fast JPEG encryptor

40. Puzzle - an efficient, compression independent video encryption algorithm

41. A novel text and image encryption method based on chaos theory and DNA computing

42. Lattice-based completely non-malleable public-key encryption in the standard model

43. Digital Image Encryption Scheme Based on Multiple Chaotic Systems

44. VoIP encryption module for securing privacy

45. An enhanced encryption algorithm for video based on multiple Huffman tables

46. Secure Integration of Asymmetric and Symmetric Encryption Schemes

47. A new threshold authenticated encryption scheme using labor-division signature

48. An efficient conversion scheme for enhancing security of Diffie-Hellman-based encryption

49. Automated Proofs for Asymmetric Encryption

50. New Constructions for Identity-Based Unidirectional Proxy Re-Encryption

Catalog

Books, media, physical & digital resources