|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 543 occurrences of 294 keywords
|
|
|
Results
Found 831 publication records. Showing 831 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
85 | Isamu Teranishi, Wakaha Ogata |
Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Statistical Plaintext Awareness, Cramer-Shoup Scheme, Standard Model |
73 | James Birkett, Alexander W. Dent |
Relations Among Notions of Plaintext Awareness. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
An Efficient Known Plaintext Attack on FEA-M. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
73 | Michael Stay |
ZIP Attacks with Reduced Known Plaintext. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
73 | Anne Tardy-Corfdir, Henri Gilbert |
A Known Plaintext Attack of FEAL-4 and FEAL-6. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
67 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis |
67 | Yasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako |
Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
knapsack public-key cryptosystem, low-density attack, weight of plaintext, density |
64 | Paul C. van Oorschot, Michael J. Wiener |
A Known Plaintext Attack on Two-Key Triple Encryption. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Triple encryption, cryptanalysis, DES |
61 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
58 | Gregory V. Bard |
Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
Modes of Encryption, Blockwise-Adaptive Chosen-Plaintext Attack, BACPA, MACPA, Online-ness, CBC, CTR, OFB, CFB, IGE, HCBC, HPCBC, XCBC, ABC, ECB |
58 | Isamu Teranishi, Wakaha Ogata |
Relationship Between Standard Model Plaintext Awareness and Message Hiding. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Standard Model, Plaintext Awareness |
55 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations |
55 | Reihaneh Safavi-Naini, Leonid M. Tombak |
Authentication Codes in Plaintext and Chosen-content Attacks. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
55 | Ivan Damgård, Jesper Buus Nielsen |
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway |
Relations Among Notions of Security for Public-Key Encryption Schemes. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness |
49 | Keita Xagawa, Keisuke Tanaka |
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
proof of plaintext knowledge, identification, code, zero knowledge, proof of knowledge, NTRU, lattice-based cryptography |
46 | Jacques Patarin |
Security of Random Feistel Schemes with 5 or More Rounds. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Jacques Patarin |
Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Thomas Jakobson |
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes |
46 | Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson |
Plaintext Recovery Attacks against SSH. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Min-Sung Koh, Esteban Rodriguez-Marek, Claudio Talarico |
A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen-Plaintext Attacks. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
46 | H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar |
Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. |
Intelligent Information Processing |
2006 |
DBLP DOI BibTeX RDF |
Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES |
46 | Alexander W. Dent |
The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Jonathan Herzog, Moses D. Liskov, Silvio Micali |
Plaintext Awareness via Key Registration. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Dominik Engel, Rade Kutil, Andreas Uhl |
A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000 |
40 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. |
SOFSEM |
2006 |
DBLP DOI BibTeX RDF |
Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery |
40 | Martijn Stam |
A Key Encapsulation Mechanism for NTRU. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Key Encapsulation, Random Oracle Model, NTRU, Plaintext Awareness |
40 | Siguna Müller |
On the Security of Williams Based Public Key Encryption Scheme. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
(Weak)- Sole-Samplability, Factorization Intractability, Oracle Hashing, Williams' Encryption Scheme, Chosen Ciphertext Security, Plaintext Awareness |
40 | B. John Oommen, Jack R. Zgierski |
Breaking Substitution Cyphers Using Stochastic Automata. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1993 |
DBLP DOI BibTeX RDF |
substitution cyphers, finite plaintext alphabet, cypher alphabet, unigrams, trigrams, automaton solution, cypher learning automaton, learning, cryptography, learning systems, cardinality, stochastic automata, stochastic automata, statistical information, relaxation theory, relaxation scheme |
40 | T. R. N. Rao, Kil-Hyun Nam |
Private-Key Algebraic-Coded Cryptosystems. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
private-key cryptosystems, Algebraic codes, crypto-complexity, Joint Encryption and Error-control Coding, public-key cryptosystems, cryptosystems, chosen-plaintext attack |
37 | Jonathan Katz, Moti Yung |
Characterization of Security Notions for Probabilistic Private-Key Encryption. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Private-key encryptions, Definitions |
37 | Kenneth G. Paterson, Arnold K. L. Yau |
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
padding oracle attack, CBC-mode encryption, ISO standard |
37 | Goce Jakimoski, Yvo Desmedt |
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis |
37 | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
New Attacks on PKCS#1 v1.5 Encryption. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
37 | Serge Vaudenay |
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
37 | Ueli M. Maurer |
A Provably-Secure Strongly-Randomized Cipher. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
37 | A. F. Webster, Stafford E. Tavares |
On the Design of S-Boxes. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
37 | A. K. Leung, Stafford E. Tavares |
Sequence Complexity as a Test for Cryptographic Systems. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
37 | Jan Camenisch, Nishanth Chandran, Victor Shoup |
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Martin Hlavác |
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem |
37 | Shafi Goldwasser, Dmitriy Kharchenko |
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen |
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. |
ISNN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Kazuhiko Minematsu, Yukiyasu Tsunoo |
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Mihir Bellare, Adriana Palacio |
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
37 | John Kelsey |
Compression and Information Leakage of Plaintext. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Atsuko Miyaji, Masao Nonaka, Yoshinori Takii |
Known Plaintext Correlation Attack against RC5. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
37 | David A. McGrew, Scott R. Fluhrer |
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
37 | René Struik, Johan van Tilburg |
The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
37 | Takuya Suzuki, Hayato Yamana |
PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNN. |
AINA (4) |
2024 |
DBLP DOI BibTeX RDF |
|
37 | David A. McGrew |
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
37 | Herbert S. Bright |
Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext. |
Cryptologia |
1977 |
DBLP DOI BibTeX RDF |
|
30 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
30 | Isamu Teranishi, Wakaha Ogata |
Relationship between Two Approaches for Defining the Standard Model PA-ness. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Standard Model, Plaintext Awareness |
30 | Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko |
Security Analysis of MISTY1. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
MISTY1, Higher order differential, Chosen plaintext attack |
30 | Jun Song 0003, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang |
Cryptanalysis of Two-Round DES Using Genetic Algorithms. |
ISICA |
2007 |
DBLP DOI BibTeX RDF |
two-round DES, known plaintext attack, genetic algorithm, cryptanalysis, fitness function |
30 | Joydip Mitra |
A Near-Practical Attack Against B Mode of HBB. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
known-plaintext attack, HBB, cryptanalysis, stream cipher |
30 | Feng Bao 0001 |
Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. |
IEEE Trans. Computers |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, Cellular automata, encryption, chosen-plaintext attack |
30 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Practical Symmetric On-Line Encryption. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversary, Symmetric encryption, chosen plaintext attacks |
30 | Philippe Oechslin |
Making a Faster Cryptanalytic Time-Memory Trade-Off. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off |
28 | Baudoin Collard, François-Xavier Standaert |
A Statistical Saturation Attack against the Block Cipher PRESENT. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Joana Treger, Jacques Patarin |
Generic Attacks on Feistel Networks with Internal Permutations. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
28 | Elaine Shi, Brent Waters |
Delegating Capabilities in Predicate Encryption Systems. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | David Oranchak |
Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
codebreaking, homophonic substitution, zodiac killer, zodiac murder ciphers, genetic algorithms, cryptography, evolutionary computing, constraint satisfaction |
28 | Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Practical Deniable Encryption. |
SOFSEM |
2008 |
DBLP DOI BibTeX RDF |
deniable encryption |
28 | Hongjun Wu 0001, Bart Preneel |
Differential-Linear Attacks Against the Stream Cipher Phelix. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Neri Merhav |
On the shannon cipher system with a capacity-limited key-distribution channel. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations |
28 | Yevgeniy Dodis, Jonathan Katz |
Chosen-Ciphertext Security of Multiple Encryption. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Pascal Junod |
New Attacks Against Reduced-Round Versions of IDEA. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
Demirci-Biryukov relation, Block ciphers, IDEA |
28 | Ivan Damgård, Thomas Pedersen, Louis Salvail |
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
28 | Vlastimil Klíma, Tomás Rosa |
Further Results and Considerations on Side Channel Attacks on RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen |
Attacking Predictable IPsec ESP Initialization Vectors. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre |
Online Ciphers and the Hash-CBC Construction. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Johan Borst, Bart Preneel, Joos Vandewalle |
Linear Cryptanalysis of RC5 and RC6. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Adam L. Young, Moti Yung |
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Tatsuaki Okamoto, Shigenori Uchiyama |
A New Public-Key Cryptosystem as Secure as Factoring. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Alex Biryukov, Eyal Kushilevitz |
From Differential Cryptanalysis to Ciphertext-Only Attacks. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis |
28 | Burton S. Kaliski Jr., Yiqun Lisa Yin |
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Wenbo Mao, Colin Boyd |
On Strengthening Authentication Protocols to Foil Cryptanalysis. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
28 | Chae Hoon Lim, Pil Joong Lee |
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
28 | Kazuo Ohta, Mitsuru Matsui |
Differential Attack on Message Authentication Codes. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
28 | S. M. Jennings |
Multiplexed Sequences: Some Properties of the Minimum Polynomial. |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
|
27 | Ueli M. Maurer, Johan Sjödin |
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Maryam Arvandi, Alireza Sadeghian |
Chosen Plaintext Attack against Neural Network-Based Symmetric Cipher. |
IJCNN |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Debasis Mazumdar, Soma Mitra, Sonali Dhali, Sankar K. Pal |
A Chosen Plaintext Steganalysis of Hide4PGP V 2.0. |
PReMI |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jonathan Katz |
Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Kazukuni Kobara, Hideki Imai |
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Soichi Furuya |
Slide Attacks with a Known-Plaintext Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Lars R. Knudsen, John Erik Mathiassen |
A Chosen-Plaintext Linear Attack on DES. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Henri Gilbert, Pascal Chauvaud |
A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
27 | Johan van Tilburg |
Two Chosen Plaintext Attacks on the Li-Wang Joint Authentication and Encryption Scheme. |
AAECC |
1993 |
DBLP DOI BibTeX RDF |
|
27 | Mitsuru Matsui, Atsuhiro Yamagishi |
A New Method for Known Plaintext Attack of FEAL Cipher. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
27 | Toshinobu Kaneko |
A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
21 | Haibin Zhang, Hui Zhang |
A Security Enhancement Scheme for Image Perceptual Hashing. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
multimedia content security, error correcting code, perceptual hashing, chosen-plaintext attack |
21 | Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee |
Collect and broadcast news in security. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
cipher text, plaintext, algorithm, encryption, decryption |
21 | G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha |
Performance Enhancement of CAST-128 Algorithm by modifying its function. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext |
18 | Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Practical ID-based encryption for wireless sensor network. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
online/offline encryption, identity-based encryption, wireless sensor network security |
18 | Yang Xiao 0001, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani |
Stream-based cipher feedback mode in wireless error channel. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 831 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|