Results 231 to 240 of about 1,838 (257)
Dynamic Encryption Based on Deterministic Chaos
Tatiana D. Kainova
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Deterministic Encryption with the Thorp Shuffle
Journal of Cryptology, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Morris, Ben +2 more
openaire +2 more sources
Quantifying Information Leakage of Deterministic Encryption
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019In order to protect user data while maintaining application functionality, encrypted databases can use specialized cryptography such as property-revealing encryption, which allows a property of the underlying plaintext values to be computed from the ciphertext.
Mireya Jurado, Geoffrey Smith
openaire +1 more source
Big Data Privacy Using Fully Homomorphic Non-Deterministic Encryption
2017 IEEE 7th International Advance Computing Conference (IACC), 2017Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas along with computers and communication. The security of data which stored online has become a main concern. Several attackers play with confidentiality of the user.
Tejashree B. Patil +2 more
openaire +1 more source
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
2009We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto'07. Our work introduces: 1) A generic and efficient construction of deterministic length-preserving hybrid encryption, which is an improvement on the scheme sketched in the above paper; to our best knowledge, this is ...
Yang Cui +3 more
openaire +1 more source
2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), 2017
Information security is crucial to data storage and transmission, which is necessary to protect information under various hostile environments. Cryptography serves as a major element to ensure confidentiality in both communication and information technology, where the encryption and decryption schemes are implemented to scramble the pure plaintext and ...
Zhengmao Ye, Hang Yin, Yongmao Ye
openaire +1 more source
Information security is crucial to data storage and transmission, which is necessary to protect information under various hostile environments. Cryptography serves as a major element to ensure confidentiality in both communication and information technology, where the encryption and decryption schemes are implemented to scramble the pure plaintext and ...
Zhengmao Ye, Hang Yin, Yongmao Ye
openaire +1 more source
Deterministic phase encoding encryption in arbitrary phase-step digital holography
SPIE Proceedings, 2010A deterministic phase-encoded encryption system, which adopts a lenticular lens array (LLA) sheet as a phase modulator (key), based on arbitrary two-step phase-shift interferometry (PSI), with an unknown phase step, is presented. The principle of encryption and decryption which is using a LLA in arbitrary unknown two-step PSI is given.
Chi-Ching Chang +2 more
openaire +1 more source
Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks
2017Secure computation (i.e., performing computation while keeping inputs private) is a fundamental problem in cryptography. In this paper, we present an efficient and secure 2-party computation protocol for deterministic automata evaluation, a problem of large practical relevance.
Giovanni Di Crescenzo +2 more
openaire +1 more source
Optical Image Encryption Process Using Triple Deterministic Spherical Phase Masks Array
2020In this paper, we perform a study of optical image encryption using triple deterministic phase mask (TDPE) based on diffractive spherical phase masks array (SPMA). By combining the diffractive spherical phase masks array with the deterministic phase masks method we can improve the security level of an encryption scheme by increasing the key space and ...
Wiam Zamrani, Esmail Ahouzi
openaire +1 more source
A Non-deterministic Searchable Encryption Scheme in Internet of Things Environments
Advanced Science and Technology Letters, 2015Today, the developments of ICT move to IoT from M2M environments. In this environment, it generally use cloud storage service to store massive data. The data should be stored encrypted, because non-encrypted data may cause problems with the personal privacy. However, the encrypted data is decrypted when retrieve keyword.
Junho Jeong, Yunsik Son
openaire +1 more source

