Search

Your search keyword '"56-bit encryption"' showing total 1,326 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption" Topic multiple encryption Remove constraint Topic: multiple encryption
1,326 results on '"56-bit encryption"'

Search Results

1. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

2. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

3. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

4. A Generic Scheme of plaintext-checkable database encryption

5. Identity-based broadcast encryption with continuous leakage resilience

6. Cryptanalysis and security improvement for a symmetric color image encryption algorithm

7. Attribute‐based broadcast encryption scheme for lightweight devices

8. An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System

9. Efficient Anonymous Multireceiver Certificateless Encryption

10. Criteria-Based Encryption

11. Secure and private control using semi-homomorphic encryption

12. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

13. ENHANCE THE DATA SECURITY BY CHANGINGTHE ENCRYPTION TECHNIQUE BASED ON DATA PATTERN IN BLOCK BASED PRIVATE KEY DATA ENCRYPTION

14. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security

15. Efficient and secure identity-based encryption scheme with equality test in cloud computing

16. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

17. Data Control in Cloud Based Encryption

18. Encryption of Data Using Radix-64 and Symmetric Key Encryption

19. An optimized DNA based encryption scheme with enforced secure key distribution

20. A multithreaded programming approach for multimedia big data: encryption system

21. Fpga Implementation of Image Encryption and Decryption Using Aes Algorithm Along With Key Encryption

22. An Encryption Key for Secure Authentication: The Dynamic Solution

23. Comparative Study of cryptographic encryption algorithms

24. Local Data Security through Encryption

25. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes

26. A novel location-based encryption model using fuzzy vault scheme

27. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

28. Implementation of Advanced Encryption Standard Algorithm with Key Length of 256 Bits for Preventing Data Loss in an Organization

29. Improved, black-box, non-malleable encryption from semantic security

30. Chaos Image Encryption Methods: A Survey Study

31. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

32. Increasing robustness of data encryption standard by integrating DNA cryptography

34. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices

35. Efficient Chosen-Ciphertext Secure Encryption from R-LWE

36. A resource-efficient encryption algorithm for multimedia big data

37. Security enhancement for AES encrypted speech in communications

38. An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC video stream

39. An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption

40. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

41. Protecting Information with Subcodstanography

42. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things

43. Improvement of Advanced Encryption Standard Algorithm With Shift Row and S.Box Modification Mapping in Mix Column

44. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model

45. Code-Based Cryptography: State of the Art and Perspectives

46. Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network

47. Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud

48. Deceptive Deletion Triggers Under Coercion

49. Secured Permutation and Substitution Based Image Encryption Algorithm for Medical Security Applications

50. Certificateless encryption secure against selective opening attack

Catalog

Books, media, physical & digital resources