Search

Your search keyword '"Known-plaintext attack"' showing total 376 results

Search Constraints

Start Over You searched for: Descriptor "Known-plaintext attack" Remove constraint Descriptor: "Known-plaintext attack"
376 results on '"Known-plaintext attack"'

Search Results

1. Cryptanalyzing an Image Encryption Scheme Using Synchronization of Memristor Chaotic Systems.

2. A Reversible Data-Hiding Method for Encrypted Images Based on Adaptive Quadtree Partitioning and MSB Prediction.

3. A Reversible Data-Hiding Method for Encrypted Images Based on Adaptive Quadtree Partitioning and MSB Prediction

4. Cryptanalysis of a Multiround Image Encryption Algorithm Based on 6D Self-Synchronizing Chaotic Stream Cipher.

5. Cracking SIGABA in less than 24 hours on a consumer PC.

6. Genetic Algorithm Assisted State-Recovery Attack on Round-Reduced Xoodyak

7. Cryptanalysis and Improvement of Novel Image Encryption Technique Using Hybrid Method of Discrete Dynamical Chaotic Maps and Brownian Motion.

8. Known-Plaintext Attack on Cryptosystem Based on Fractional Hartley Transform Using Particle Swarm Optimization Algorithm

9. Secure Compressive Sensing

10. Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps

11. Security for cyber-physical systems: Secure control against known-plaintext attack.

12. Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher

13. On The Security of Block Permutation and Co-XOR in Reversible Data Hiding

14. Privacy-preserving image compressed sensing by embedding a controllable noise-injected transformation for IoT devices.

15. Cryptanalysis of Reversible Data Hiding in Encrypted Images by Block Permutation and Co-Modulation

16. A review on various cryptographic techniques & algorithms

17. Image lossless encoding and encryption method of EBCOT Tier1 based on 4D hyperchaos

18. Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme.

19. Steganography-based voice hiding in medical images of COVID-19 patients

20. A Near-Practical Attack Against B Mode of HBB

21. The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers

22. A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits

23. Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry Under Quantum Collective Known-Plaintext Attacks

24. Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps

25. Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.

26. Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits.

27. Security analysis of a novel fusion encryption algorithm based on dna sequence operation and hyper-chaotic system.

28. A known-plaintext attack on iterative random phase encoding in fractional Fourier domains.

29. A superlative image encryption technique based on bit plane using key-based electronic code book

30. Security analysis of multiple permutation encryption adopt in reversible data hiding

31. Security for cyber-physical systems: Secure control against known-plaintext attack

32. Cryptanalysis of genetic algorithm-based encryption scheme

33. A Multidimensional Chaotic Image Encryption Algorithm based on DNA Coding

34. Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures

35. Security analyses of The encryption algorithm designed using difference equations

36. Immunity of Lightweight DES Algorithm (DESL) Against Linear Cryptanalysis Attack

37. Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion

38. An Adaptive Image Encryption Scheme Using Fractal Dynamical System and DNA Operations

39. An Image Encryption Algorithm Based on Four Dimensional Hyperchaotic System

40. Cryptodiagnosis of 'Kryptos K4'

41. Cryptanalysis of an information encryption in phase space.

42. Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.

43. Cracking a hierarchical chaotic image encryption algorithm based on permutation.

44. Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages.

45. Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps.

46. Securing audio data using K-shuffle technique

47. A fast image encryption algorithm based on compressive sensing and hyperchaotic map

48. Security analysis of secure kNN and ranked keyword search over encrypted data

49. On symmetric color image encryption system with permutation-diffusion simultaneous operation

50. Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme

Catalog

Books, media, physical & digital resources