Search

Your search keyword '"Plaintext"' showing total 3,649 results

Search Constraints

Start Over You searched for: Descriptor "Plaintext" Remove constraint Descriptor: "Plaintext"
3,649 results on '"Plaintext"'

Search Results

101. Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy

102. Text Encryption Method Using multi Hyper-chaotic systems

103. Evaluation of effectiveness of chosen-plaintext attacks on the Rao-Nam cryptosystem over a finite Abelian group

104. Visual Quality Assessment for Perceptually Encrypted Light Field Images

105. Trajectory control and image encryption using affine transformation of lorenz system

106. Cryptanalysis of nonlinear confusion component based encryption algorithm

107. Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection

108. Attribute-Based Secure Announcement Sharing Among Vehicles Using Blockchain

109. Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching

110. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments

111. Multi-Image Encryption Based on Compressed Sensing and Deep Learning in Optical Gyrator Domain

112. hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave

113. A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad

114. Perancangan Aplikasi Penyisipan Pesan pada File Mp3 menggunakan Metode Parity Coding dan Enkripsi Caesar Cipher

115. Real-time implementation of a chaos based cryptosystem on low-cost hardware

116. An improved ROI-based reversible data hiding scheme completely separable applied to encrypted medical images

117. A novel image encryption cryptosystem based on true random numbers and chaotic systems

118. Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory

119. Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising

120. Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study

121. Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption

122. RAW DATA SECURITY BY USING ELGAMAL AND SHA 256 PUBLIC KEY ALGORITHM

123. Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

124. A flexible image cipher based on orthogonal arrays

125. Attribute-based proxy re-encryption from standard lattices

126. KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption

127. An image encryption algorithm with a plaintext‐related quantisation scheme

128. A HOMOMORPHIC ENCRYPTION BASED ON-LINE VOTING SYSTEM

129. SearchBC: A Blockchain-Based PEKS Framework for IoT Services

130. A secure image encryption scheme based on genetic mutation and MLNCML chaotic system

131. Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation

132. PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system

133. A DNA image encryption based on a new hyperchaotic system

134. Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system

135. A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata

136. Bit-level image encryption algorithm based on BP neural network and gray code

137. Design, analysis, and implementation of a new lightweight block cipher for protecting IoT smart devices

138. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation

139. A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions

140. A Novel Dynamic Attack on Classical Ciphers Using an Attention-Based LSTM Encoder-Decoder Model

141. Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings

142. Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box

143. A Novel Chaotic Block Image Encryption Algorithm Based on Deep Convolutional Generative Adversarial Networks

144. Encryption and Decryption Algorithms in Symmetric Key Cryptography Using Graph Theory

145. Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences

146. Secure Image Inference Using Pairwise Activation Functions

147. A Residual Chaotic System for Image Security and Digital Video Watermarking

148. Noise-Resistant Image Encryption Scheme for Medical Images in the Chaos and Wavelet Domain

149. On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle

150. Image encryption algorithm with circle index table scrambling and partition diffusion

Catalog

Books, media, physical & digital resources