Results 11 to 20 of about 1,838 (257)

Deterministic quantum-public-key encryption: Forward search attack and randomization [PDF]

open access: greenPhysical Review A, 2009
5 pages, 1 ...
Georgios M. Nikolopoulos   +1 more
openalex   +3 more sources

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles [PDF]

open access: bronze, 2008
We strengthen the foundations of deterministic public-key encryption via definitional equivalences and standard-model constructs based on general assumptions. Specifically we consider seven notions of privacy for deterministic encryption, including six forms of semantic security and an indistinguishability notion, and show them all equivalent.
Mihir Bellare   +3 more
openalex   +2 more sources

Optical image encryption technique based on deterministic phase masks [PDF]

open access: greenOptical Engineering, 2016
The double-random phase encoding (DRPE) scheme, which is based on a 4f optical correlator system, is considered as a reference for the optical encryption field. We propose a modification of the classical DRPE scheme based on the use of a class of structured phase masks, the deterministic phase masks.
Wiam Zamrani   +4 more
openalex   +3 more sources

Big Data Analysis And Deterministic Encryption Challenges

open access: diamondInternational Journal of Advanced Research in Computer Science, 2017
Over the past decade, big data analysis has seen an exponential growth and will certainly continue to witness spectacular developments due to the emergence of new interactive multimedia applications and highly integrated systems driven by the rapid growth in information services and microelectronic devices. Up to yet, large no.
Aasim Shafi
openalex   +3 more sources

Non-deterministic Image Encryption Based on Symmetric Cryptosystem

open access: diamondProcedia Computer Science, 2016
AbstractIn this paper, an encryption algorithm for images using a secret key of 128-bits is proposed. To improve the security of the encrypted image, a unique timestamp is used while encryption. Initially, the image is divided into multiple blocks and each block is encrypted separately.
B. Sri Gurubaran   +3 more
openalex   +2 more sources

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting [PDF]

open access: bronzeJournal of Cryptology, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zvika Brakerski, Gil Segev
openalex   +5 more sources

Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions [PDF]

open access: closedJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ananth Raghunathan   +2 more
openalex   +5 more sources

A generic construction of CCA-secure deterministic encryption [PDF]

open access: closed, 2019
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is an important technique for searchable encryption; it allows quick, logarithmic-time, search over encrypted data items. The technique is most effective in scenarios where frequent search queries are performed over a huge database of unpredictable data ...
Meijuan Huang   +5 more
openalex   +3 more sources

Hybrid Image Encryption Technique Using Genetic Algorithm and Lorenz Chaotic System [PDF]

open access: yesITM Web of Conferences, 2020
One of the important application of image encryption is storing confidential and important images on a local device or a database in such a way that only the authorized party can view or perceive it.
Chikkareddi Vishwanath   +4 more
doaj   +1 more source

Incremental Deterministic Public-Key Encryption [PDF]

open access: yesJournal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mironov, Ilya   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy