Search

Your search keyword '"Plaintext"' showing total 224 results

Search Constraints

Start Over You searched for: Descriptor "Plaintext" Remove constraint Descriptor: "Plaintext" Publisher springer science and business media llc Remove constraint Publisher: springer science and business media llc
224 results on '"Plaintext"'

Search Results

1. Image lossless encoding and encryption method of EBCOT Tier1 based on 4D hyperchaos

2. Color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation

3. Ciphertext-only attacks on the double random phase encryption based on redundancy vulnerability

4. Range-gated laser image compression and encryption scheme based on bidirectional diffusion

5. A high security BioHashing encrypted speech retrieval algorithm based on feature fusion

6. Hybrid chaotic system-oriented artificial fish swarm neural network for image encryption

7. Steganography-based voice hiding in medical images of COVID-19 patients

8. Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy

9. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments

10. Real-time implementation of a chaos based cryptosystem on low-cost hardware

11. An improved ROI-based reversible data hiding scheme completely separable applied to encrypted medical images

12. A novel image encryption cryptosystem based on true random numbers and chaotic systems

13. Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption

14. A secure image encryption scheme based on genetic mutation and MLNCML chaotic system

15. PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system

16. A DNA image encryption based on a new hyperchaotic system

17. Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system

18. Bit-level image encryption algorithm based on BP neural network and gray code

19. Design, analysis, and implementation of a new lightweight block cipher for protecting IoT smart devices

20. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation

21. Image encryption algorithm with circle index table scrambling and partition diffusion

22. A chaotic image encryption algorithm based on a counting system and the semi-tensor product

23. Improved algebraic attacks on lightweight block ciphers

24. Double image encryption based on symmetry of 2D-DFT and equal modulus decomposition

25. A novel RGB image encryption algorithm based on DNA sequences and chaos

26. A novel gray scale image encryption scheme based on pixels’ swapping operations

27. A secure image encryption scheme with compression-confusion-diffusion structure

28. Encryption technology of voice transmission in mobile network based on 3DES-ECC algorithm

29. An efficient image encryption algorithm based on multi chaotic system and random DAN coding

30. Security analysis of multiple permutation encryption adopt in reversible data hiding

31. A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing

32. Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm

33. TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications

34. A novel compressive sensing-based framework for image compression-encryption with S-box

35. Attribute-based encryption with outsourced decryption in blockchain

36. Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR)

37. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table

38. Security Estimates of a Ring-Lwe Symmetric Cryptosystem Against Chosen Plaintext Attack

39. On the security of the modified Dual-ouroboros PKE using Gabidulin codes

40. Robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipher

41. Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures

42. Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp

43. Secure and collusion-resistant data aggregation from convertible tags

44. A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles

45. Subdata image encryption scheme based on compressive sensing and vector quantization

46. Security Analysis of an Enhanced Certificateless Signcryption in the Standard Model

47. Cryptosystem design based on Hermitian curves for IoT security

48. LRBC: a lightweight block cipher design for resource constrained IoT devices

49. Secure Encrypted Data Deduplication Based on Data Popularity

50. 'S-Box' Implementation of AES Is Not Side Channel Resistant

Catalog

Books, media, physical & digital resources