Search

Your search keyword '"56-bit encryption"' showing total 2,022 results

Search Constraints

Start Over You searched for: Descriptor "56-bit encryption" Remove constraint Descriptor: "56-bit encryption"
2,022 results on '"56-bit encryption"'

Search Results

151. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

153. Public-Key Encryption

154. On Ends-to-Ends Encryption

155. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography\ud

156. On the security of a class of diffusion mechanisms for image encryption

157. Securely outsourcing the ciphertext-policy attribute-based encryption

158. An Enhanced Image Encryption Scheme using 16 Byte Key

159. Revocable Quantum Timed-Release Encryption

160. Dual trapdoor identity-based encryption with keyword search

161. Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs

162. WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

163. A Secure Encryption/Decryption Technique using Transcendental Number

164. Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network

165. Properties of gsw and their applications

166. A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

167. Efficient selective image encryption

168. The image encryption algorithm with plaintext-related shuffling

169. Efficient and secure multi-functional searchable symmetric encryption schemes

170. Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption

171. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption

172. Attacks on the Authenticated Encryption Mode of Operation PAE

173. Physical layer encryption scheme using finite‐length polar codes

174. Parallel search over encrypted data under attribute based encryption on the Cloud Computing

175. A novel authenticated encryption scheme and its extension

176. Fully secure anonymous spatial encryption under affine space delegation functionality revisited

177. A shareable keyword search over encrypted data in cloud computing

178. A Systematic Assessment of the Security of Full Disk Encryption

179. Simple Matrix – A Multivariate Public Key Cryptosystem (MPKC) for Encryption

180. Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search

181. Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme

182. A Modified Advanced Encryption Standard Algorithm for Image Encryption

183. Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys: TABLE 1

184. XOR Encryption Versus Phase Encryption, an In-Depth Analysis

185. Symmetric searchable encryption with efficient range query using multi-layered linked chains

186. An Efficient Hardware Implementation of Lightweight Block Cipher LEA-128/192/256 for IoT Security Applications

187. Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks

188. A Secure Reconfigurable Crypto IC With Countermeasures Against SPA, DPA, and EMA

189. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

190. SKENO: Secret key encryption with non-interactive opening

191. Substring-Searchable Symmetric Encryption

192. Cryptanalysis of chosen symmetric homomorphic schemes

193. Data Security using Compression and Cryptography Techniques

194. Secure Cloud Computing with RC4 Encryption and Attack Detection Mechanism

195. An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes

196. An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks

197. Anonymous protocols: Notions and equivalence

198. Decomposition by binary codes‐based speedy image encryption algorithm for multiple applications

199. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption

200. Adaptively secure broadcast encryption under standard assumptions with better efficiency

Catalog

Books, media, physical & digital resources