نتایج جستجو برای: encryption

تعداد نتایج: 27368  

Journal: :IACR Cryptology ePrint Archive 2012
Dana Dachman-Soled

The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, 1997). Deniable encryption is a regular public key encryption scheme with the added feature that after running the protocol honestly and transmitting a message m, both Sender and Receiver may produce random coins showing that the transmitted ciphertext was an encryption of any message m′ in the message space. D...

2016
L. Dolendro Singh Manglem Singh

With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...

2007
Ted Krovetz

This paper presents an efficient authenticated encryption construction based on a universal hash function and block cipher. Encryption is achieved via counter-mode while authentication uses the Wegman-Carter paradigm. A single block-cipher key is used for both operations. The construction is instantiated using the hash functions of UMAC and VMAC, resulting in authenticated encryption with peak ...

2014
Madhu Goel Rupinder Kaur

This paper focus on the different kinds of symmetric key encryption techniques those exist in present world for securing data communication. It also frames all the techniques related to variety of encryption like image encryption, information encryption, double encryption. It aims to explain the performance parameters that are used in encryption processes and analyzing on their security issues....

2004
Peter Fairbrother

Golle et al recently introduced universal re-encryption, defining it as re-encryption by a player who does not know the key used for the original encryption, but which still allows an intended player to recover the plaintext. Universal re-encryption is potentially useful as part of many information-hiding techniques, as it allows any player to make ciphertext unidentifiable without knowing the ...

2005
Mark Giereth

In this paper a method for Partial RDF Encryption (PRE) is proposed in which sensitive data in an RDF-graph is encrypted for a set of recipients while all non-sensitive data remain publicly readable. The result is an RDF-compliant self-describing graph containing encrypted data, encryption metadata, and plaintext data. For the representation of encrypted data and encryption metadata, the XML-En...

Journal: :Communications of the ACM 2019

Journal: :International Journal of Security and Networks 2011

Journal: :The Journal of The Institute of Image Information and Television Engineers 2015

2014
Vikas Mittal H. C. Chen J. I. Guo L. C. Huang N. K. Pareek Vinod Patidar K. L. Chung L. C. Chang C. Alexopoulos N. Bourbakis

In recent years, many multimedia and image encryption techniques based on chaotic maps have been proposed. In this paper, we propose a novel multimedia data encryption technique called MDEA (Multimedia Data Encryption Algorithm). Proposed encryption scheme is based on two digital chaotic maps, which in turn are used to generate two different chaotic sequences. Detail description of the proposed...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید