-
1
A lightweight 256 hexadecimal character substitution Cipher algorithm
Published 2025-07-01Subjects: Get full text
Article -
2
Ciphertext-only fault analysis of the SIMON lightweight cipher
Published 2019-11-01Subjects: “…lightweight cipher;SIMON;ciphertext-only fault analysis…”
Get full text
Article -
3
Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme
Published 2025-05-01Subjects: Get full text
Article -
4
Ciphertext-Only Attack on Phase-Shifting Interferometery-Based Encryption
Published 2017-01-01Subjects: “…Ciphertext-only attack…”
Get full text
Article -
5
Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations
Published 2025-06-01Subjects: Get full text
Article -
6
Research on ciphertext search for the cloud environment
Published 2013-07-01Subjects: Get full text
Article -
7
Method of ciphertext retrieval in mobile edge computing based on block segmentation
Published 2020-07-01Subjects: Get full text
Article -
8
Chosen-Ciphertext Secure Unidirectional Proxy Re-Encryption Based on Asymmetric Pairings
Published 2024-12-01Subjects: Get full text
Article -
9
-
10
An access control scheme for IoT based on smart contracts and CP-ABE
Published 2024-10-01Subjects: Get full text
Article -
11
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing
Published 2020-01-01Subjects: Get full text
Article -
12
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
Published 2024-01-01Subjects: “…Ciphertext, CRT, Cryptosystem, Plaintext, Playfair cipher, Private and public key, RSA cipher…”
Get full text
Article -
13
Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
Published 2025-01-01Subjects: Get full text
Article -
14
Committing Wide Encryption Mode with Minimum Ciphertext Expansion
Published 2025-03-01Subjects: Get full text
Article -
15
-
16
RSA modulus length regression prediction based on the Run Test and machine learning in the ciphertext-only scenarios
Published 2025-07-01Subjects: Get full text
Article -
17
Key storage management scheme based on keyed hash tree with state
Published 2018-05-01Subjects: Get full text
Article -
18
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01Subjects: “…multi-key;locality sensitive hashing;proxy re-encryption;known ciphertext attack…”
Get full text
Article -
19
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01Subjects: Get full text
Article -
20
Simple Matrix encryption scheme with variable ciphertext length
Published 2018-04-01Subjects: “…the proportion of plaintext and ciphertext…”
Get full text
Article