We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption

    In this paper, we address the open problem posed by Ge et al. in 2020, which was to design a new attribute-based proxy re-encryption with keyword...

    Sourav Bera, Y. Sreenivasa Rao in SN Computer Science
    Article 23 April 2024
  2. Cloud-decryption-assisted image compression and encryption based on compressed sensing

    In this paper, we propose a new image compression and encryption scheme (ICES) based on compressed sensing (CS) and double random phase encoding...

    Jiangyu Fu, Zhihua Gan, ... Yang Lu in Multimedia Tools and Applications
    Article 07 March 2022
  3. Short Paper: Verifiable Decryption for BGV

    In this work we present a direct construction for verifiable decryption for the BGV encryption scheme by combining existing zero-knowledge proofs for...
    Conference paper 2023
  4. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing

    Cloud file sharing (CFS) has become one of the important tools for enterprises to reduce technology operating costs and improve their...

    Boxue Huang, Juntao Gao, Xuelian Li in Journal of Cloud Computing
    Article Open access 11 March 2023
  5. Automated decryption of siri bhoovalaya using cryptography and natural language processing techniques

    "The Siri Bhoovalaya is a seminal work of literature, believed to have been composed approximately a millennium ago, which encompasses diverse...

    Article 14 May 2024
  6. Decryption and Password Cracking

    In modern computing in general, and in forensic examinationsExamination in particular, encrypted data is common. Traditionally, this has been because...
    Joakim Kävrestad, Marcus Birath, Nathan Clarke in Fundamentals of Digital Forensics
    Chapter 2024
  7. Payable Outsourced Decryption for Functional Encryption Using BlockChain

    In many new implementations that needs data storage and exchange (such as cloud storage services), the notion of Functional Encryption...
    R. Sendhil, S. Asifa, A. Savitha Sree in Artificial Intelligence of Things
    Conference paper 2024
  8. Server-Supported Decryption for Mobile Devices

    We propose a threshold encryption scheme with two-party decryption, where one of the keyshares may be stored and used in a device that is able to...
    Johanna Maria Kirss, Peeter Laud, ... Jelizaveta Vakarjuk in Security and Trust Management
    Conference paper 2023
  9. Blind Decryption and Private Information Delivery

    We analyze the privacy protection scheme given by Bao, Deng and Feng which is a cryptographic protocol similar to oblivious transfer and private...
    Akihiro Yamamura in Mobile Internet Security
    Conference paper 2023
  10. PrimeSwitch—Encryption and Decryption Algorithm Using RSA Key Generation

    This paper proposes an encryption and decryption algorithm PrimeSwitch that secures data using a key generated using RSA Method. It provides...
    Priyanka Bhatele, Ishan Shivankar, ... Shreya Nale in Cyber Security and Digital Forensics
    Conference paper 2024
  11. Verifiable Decryption in the Head

    In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a...
    Kristian Gjøsteen, Thomas Haines, ... Tjerand Silde in Information Security and Privacy
    Conference paper 2022
  12. Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern

    Cryptography secures data and serves to ensure the confidentiality of records. Playfair is a cryptographic symmetrical algorithm that encrypts...

    N. Sugirtham, R. Sherine Jenny, ... Hien Dang in International Journal of Networked and Distributed Computing
    Article Open access 01 February 2024
  13. Indistinguishable Obfuscated Encryption and Decryption Based on Transformer Model

    To solve the problem in secure encryption in cryptography, indistinguishability Obfuscation (iO) was born. It is a crypto-complete idea, based on...
    Pengyong Ding, Zian **, ... **n Zhang in Smart Computing and Communication
    Conference paper 2023
  14. Complex entropy based encryption and decryption technique for securing medical images

    During medical picture transmission, the most pressing concern is security. Medical images must be encrypted since they are extremely sensitive....

    Vinod Kumar, Vinay Pathak, ... Sachin Kumar Gupta in Multimedia Tools and Applications
    Article 26 July 2022
  15. On Active Attack Detection in Messaging with Immediate Decryption

    The widely used Signal protocol provides protection against state exposure attacks through forward security (protecting past messages) and...
    Khashayar Barooti, Daniel Collins, ... Serge Vaudenay in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  16. Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes

    RSA is well known public-key cryptosystem in modern-day cryptography. Since the inception of the RSA, several attacks have been proposed on RSA. The...

    R. Santosh Kumar, K. L. N. C. Prakash, S. R. M. Krishna in Journal of Computer Virology and Hacking Techniques
    Article 20 October 2023
  17. Automatic Detection and Decryption of AES Using Dynamic Analysis

    In this paper we propose a set of algorithms that can automatically detect the use of AES and automatically recover both the encryption key and the...

    Josef Kokeš, Jonatan Matějka, Róbert Lórencz in SN Computer Science
    Article Open access 17 June 2022
  18. Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks

    Code-based cryptography has received a lot of attention recently because it is considered secure under quantum computing. Among them, the QC-MDPC...
    Tianrui Wang, Anyu Wang, **aoyun Wang in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  19. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus

    This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order estimators or observers, by...

    Rafael Martínez-Guerra, Juan Javier Montesinos-García, Juan Pablo Flores-Flores in Synthesis Lectures on Engineering, Science, and Technology
    Book 2023
  20. On Secure Ratcheting with Immediate Decryption

    Ratcheting protocols let parties securely exchange messages in environments in which state exposure attacks are anticipated. While, unavoidably, some...
    Jeroen Pijnenburg, Bertram Poettering in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.