The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Songtao E, Bin Yu 0003, Yicai Huang Synchronous Decryption Scheme for Real-time Voice Encrypted Communication Based on Frame ID. Search on Bibsonomy ICCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Tomás Rabas, Jirí Bucek, Róbert Lórencz Single-Trace Attack on NTRU Decryption with Machine Learning and Template Profiling. Search on Bibsonomy DSD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Cosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo, Marco Guazzone Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jan Willemson Creating a Decryption Proof Verifier for the Estonian Internet Voting System. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Amit Kumar Bishnoi, Bhuvana J Carrying out Encryption and Decryption in a Multi-Tenant Cloud Environment. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Xinyan Wang, Jing Zhang, Zhaotai Meng, Bin Yi, An Hu, Ming Gu Research on symmetric encryption and decryption of multi-user shared data for cloud storage environment. Search on Bibsonomy ICISCAE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jing Zhang, Xinyan Wang, Boyu Liu, Junyi Wang, Xiaoqin Li, Liang He Research on symmetric encryption and decryption algorithm of shared data based on chaotic mapping and permutation. Search on Bibsonomy ICISCAE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Shohei Hiruta, Itaru Hosomi, Hirokazu Hasegawa, Hiroki Takakura Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption. Search on Bibsonomy COMPSAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Somchart Fugkeaw Implementing An Outsourced Dual-Proxy Signing and Decryption Scheme in Mobile Cloud Computing. Search on Bibsonomy IPDPS Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Somchart Fugkeaw, Leon Wirz, Lyhour Hak An Efficient Medical Records Access Control with Auditable Outsourced Encryption and Decryption. Search on Bibsonomy KST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Po-I Lee, Chih-Hung Wang, Wei-Chun Hsiao Implementation and Analysis on Efficient Proxy-based Multicast Secure Data Sharing Mechanism with CP-ABE Supporting Outsourcing Decryption in IoT Environment. Search on Bibsonomy ICIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yu Lu, Hao Pan 0003, Feitong Tan, Yi-Chao Chen 0001, Jiadi Yu, Jinghai He, Guangtao Xue Effectively Learning Moiré QR Code Decryption from Simulated Data. Search on Bibsonomy INFOCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Xinyuan Qiao, Suwen Song, Jing Tian 0004, Zhongfeng Wang 0001 Efficient Decryption Architecture for Classic McEliece. Search on Bibsonomy ISQED The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yun Fu, Jingyi Fu, Jinxin Wei Encryption and Decryption Using Deep Neural Network. Search on Bibsonomy MLIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Khashayar Barooti, Daniel Collins 0001, Simone Colombo 0002, Loïs Huguenin-Dumittan, Serge Vaudenay On Active Attack Detection in Messaging with Immediate Decryption. Search on Bibsonomy CRYPTO (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Tianrui Wang, Anyu Wang 0001, Xiaoyun Wang Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. Search on Bibsonomy CRYPTO (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yang Li, Qingyang Zhang, Jun Cheng, Yiyuan Zhou, Jie Cui 0004, Hong Zhong 0001 Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT. Search on Bibsonomy NaNA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Alexander Nilsson Decryption Failure Attacks on Post-Quantum Cryptography. (PDF / PS) Search on Bibsonomy 2023   RDF
15Yange Chen, Qingqing Zhao, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Josef Kokes, Jonatan Matejka, Róbert Lórencz Automatic Detection and Decryption of AES Using Dynamic Analysis. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Huthaifa A. Al Issa, Mustafa Hamzeh Al-Jarah, Ammar Almomani, Ahmad Al Nawasrah Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm. Search on Bibsonomy Int. J. Cloud Appl. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Sajjad Palanki, Alireza Shafieinejad Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Maria Perepechaenko, Randy Kuang Quantum Encryption and Decryption in IBMQ Systems using Quantum Permutation Pad. Search on Bibsonomy J. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Ying He 0006, Haiyan Wang 0009, Yuan Li, Ke Huang, Victor C. M. Leung, F. Richard Yu, Zhong Ming 0001 An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Changhee Hahn, Jongkil Kim Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Dayane Reis, Haoran Geng, Michael T. Niemier, Xiaobo Sharon Hu IMCRYPTO: An In-Memory Computing Fabric for AES Encryption and Decryption. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Dongdong Xu 0002, Xiang Wang 0006, Yuanchao Hao, Zhun Zhang, Qiang Hao, Zhiyu Zhou A More Accurate and Robust Binary Ring-LWE Decryption Scheme and Its Hardware Implementation for IoT Devices. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Haibo Yi Fast asymmetric encryption and decryption of SimpleMatrix scheme for Internet of Things. Search on Bibsonomy Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Jiangyu Fu, Zhihua Gan, Xiuli Chai, Yang Lu 0013 Cloud-decryption-assisted image compression and encryption based on compressed sensing. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Vinod Kumar 0005, Vinay Pathak, Neelendra Badal, Purnendu Shekhar Pandey, Rajesh Mishra, Sachin Kumar Gupta Complex entropy based encryption and decryption technique for securing medical images. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Chen Gao, Zidong Wang, Xiao He 0001, Hongli Dong Fault-Tolerant Consensus Control for Multiagent Systems: An Encryption-Decryption Scheme. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Chih-Min Lin, Duc-Hung Pham, Tuan-Tu Huynh Encryption and Decryption of Audio Signal and Image Secure Communications Using Chaotic System Synchronization Control by TSK Fuzzy Brain Emotional Learning Controllers. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Ningyu Chen, Jiguo Li 0001, Yichen Zhang 0003, Yuyan Guo Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Bilal S. A. Alhayani, Nagham Hamid, Firas Husham Almukhtar, Omar A. Alkawak, Hemant B. Mahajan, Ameer Sardar Kwekha Rashid, Haci Ilhan, Haydar Abdulameer Marhoon, Husam Jasim Mohammed, Ibrahim Zeghaiton Chaloob, Ahmed Alkhayyat Optimized video internet of things using elliptic curve cryptography based encryption and decryption. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Seyedeh Bahareh Zakaria, Keivan Navi Image encryption and decryption using exclusive-OR based on ternary value logic. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Ke Gu 0002, Wenbin Zhang, Xiong Li 0002, Weijia Jia 0001 Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Chengjian Liu, Yiwei Zhang, Jiajun Xu, Jian Zhao 0025, Shaohua Xiang Ensuring the Security and Performance of IoT Communication by Improving Encryption and Decryption With the Lightweight Cipher uBlock. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Kasturi Dhal, Satyananda Champati Rai, Prasant Kumar Pattnaik 0001 LIKC: A liberty of encryption and decryption through imploration from K-cloud servers. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Noor Sattar Noor, Dalal Abdulmohsin Hammood, Ali Al-Naji, Javaan S. Chahl A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication. Search on Bibsonomy Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15M. N. Sharada Guptha, M. N. Eshwarappa RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Anusha Padmavathi Rajendran, Dhanalakshmi Krishnan Sadhasivam An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Abubaker Wahaballa, Zhiguang Qin, Hisham Abdalla, Majdi Abdellatief, Mohamed Ahmed Elfaki Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata-based functional encryption for an in-vehicle sensor database system. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Yang Zhao, Xing Zhang, Xin Xie, Yi Ding, Sachin Kumar 0002 A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Aloni Cohen, Sarah Scheffler, Mayank Varia Can the Government Compel Decryption? Don't Trust - Verify. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Youngmo Kim, Byeongchan Park, Seok-Yoon Kim A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network. Search on Bibsonomy J. Web Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Lili Zhou, Xiaohui Li, Fei Tan, Yi Huang, Weina Ma A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization. Search on Bibsonomy Soft Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Harriet Farlow, Belinda M. Edwards Shining a light on 'going dark': A framework to guide the co-design and communication of decryption laws based on the passage of the Telecommunications and Other Legislation (Assistance and Access) Bill 2018. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Anis Bkakria Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Alexandru Ionita Weighted Attribute-Based Encryption with Parallelized Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Cas Cremers, Mang Zhao Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Bhuvnesh Chaturvedi, Anirban Chakraborty 0003, Ayantika Chatterjee, Debdeep Mukhopadhyay Demystifying the comments made on "A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors". Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Daniel Fallnich, Shutao Zhang, Tobias Gemmeke Efficient ASIC Architectures for Low Latency Niederreiter Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Joseph Bebel, Dev Ojha Ferveo: Threshold Decryption for Mempool Privacy in BFT networks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Ambili K. N, Jimmy Jose Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Bhuvnesh Chaturvedi, Anirban Chakraborty 0003, Ayantika Chatterjee, Debdeep Mukhopadhyay A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider 0002, François-Xavier Standaert Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Yi Ding 0003, Fuyuan Tan, Zhen Qin 0002, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption. Search on Bibsonomy IEEE Trans. Neural Networks Learn. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Mohit Dua, Drishti Makhija, Pilla Yamini Lakshmi Manasa, Prashant Mishra 3D chaotic map-cosine transformation based approach to video encryption and decryption. Search on Bibsonomy Open Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Tjerand Silde Short Paper: Verifiable Decryption for BGV. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer 0001 Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring. Search on Bibsonomy SEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Jutiphat Chatsomsanga, Chawalit Benjangkaprasert Malware Developing Guide: Encryption and Decryption. Search on Bibsonomy ICACT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider 0002, François-Xavier Standaert Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber. Search on Bibsonomy COSADE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption. Search on Bibsonomy TCC (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Aloni Cohen, Sarah Scheffler, Mayank Varia Can the Government Compel Decryption?: Don't Trust - Verify. Search on Bibsonomy CSLAW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Alexandru Ionita Weighted Attribute-based Encryption with Parallelized Decryption. Search on Bibsonomy SECRYPT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk Server-Supported Decryption for Mobile Devices. Search on Bibsonomy STM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Pengyong Ding, Zian Jin, Yizhong Liu, Min Sun, Hong Liu, Li Li, Xin Zhang Indistinguishable Obfuscated Encryption and Decryption Based on Transformer Model. Search on Bibsonomy SmartCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Kai Xiao Implementation Analysis of Encryption and Decryption Algorithm Based on python Language. Search on Bibsonomy ICSCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy A Hierarchical Decryption Method for an Eco-Friendly Securing of 3D Objects. Search on Bibsonomy MMSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Jeroen Pijnenburg, Bertram Poettering On Secure Ratcheting with Immediate Decryption. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Anis Bkakria Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption. Search on Bibsonomy DBSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Jan-Pieter D'Anvers, Senne Batsleer Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Kristian Gjøsteen, Thomas Haines, Johannes Müller 0001, Peter B. Rønne, Tjerand Silde Verifiable Decryption in the Head. Search on Bibsonomy ACISP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Yen-Cheng Chiu, Chia-Sheng Yang, Shih-Hsih Teng, Hsiao-Yu Huang, Fu-Chun Chang, Yuan Wu 0009, Yu-An Chien, Fang-Ling Hsieh, Chung-Yuan Li, Guan-Yi Lin, Po-Jung Chen, Tsen-Hsiang Pan, Chung-Chuan Lo, Win-San Khwa, Ren-Shuo Liu, Chih-Cheng Hsieh, Kea-Tiong Tang, Chieh-Pu Lo, Yu-Der Chih, Tsung-Yung Jonathan Chang, Meng-Fan Chang A 22nm 4Mb STT-MRAM Data-Encrypted Near-Memory Computation Macro with a 192GB/s Read-and-Decryption Bandwidth and 25.1-55.1TOPS/W 8b MAC for AI Operations. Search on Bibsonomy ISSCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Zahra Azad, Guowei Yang, Rashmi Agrawal 0001, Daniel Petrisko, Michael B. Taylor, Ajay Joshi RACE: RISC-V SoC for En/decryption Acceleration on the Edge for Homomorphic Computation. Search on Bibsonomy ISLPED The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Hiroto Kai, Shinnosuke Takamichi, Sayaka Shiota, Hitoshi Kiya Robustness of Signal Processing-Based Pseudonymization Method Against Decryption Attack. Search on Bibsonomy Odyssey The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Akihiro Yamamura Blind Decryption and Private Information Delivery. Search on Bibsonomy MobiSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Bita Noori, Pedram Salehpoor, Hadi S. Aghdasi RGB image Encryption and Decryption with Neural Chaotic Functions. Search on Bibsonomy CSICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Ahmed Maache, Anouar Touati, Ayoub Ouali Implementation of an AES-based real-time Video Encryption/Decryption using FPGA/HPS. Search on Bibsonomy SSD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Alberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, Melek Önen Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption. Search on Bibsonomy IH&MMSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Ke Li, Hua Li, Graeme Mund A 32-bit efficient subpipelined architecture for AES encryption and decryption. Search on Bibsonomy CIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Boyue Fang, Weize Wang, Yunlei Zhao Tight Analysis of Decryption Failure Probability of Kyber in Reality. Search on Bibsonomy ICICS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Pattavee Sanchol, Somchart Fugkeaw, Hiroyuki Sato A Mobile Cloud-based Access Control with Efficiently Outsourced Decryption. Search on Bibsonomy MobileCloud The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Decong Lin, Hongbo Cao, Chunzi Tian, Yongqi Sun The Fast Paillier Decryption with Montgomery Modular Multiplication Based on OpenMP. Search on Bibsonomy PAAP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Uk Hur, Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 (2019) 200890]. Search on Bibsonomy Digit. Investig. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao 0010 Lattice-based revocable attribute-based encryption with decryption key exposure resistance. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li Secure mobile health system supporting search function and decryption verification. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Yi Ding 0003, Guozheng Wu, Dajiang Chen, Ning Zhang 0007, Linpeng Gong, Mingsheng Cao, Zhiguang Qin DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Dilip Kumar 0005, Manoj Kumar, Gaurav Gupta 0003 An Outsourced Decryption ABE Model using ECC in Internet of Things. Search on Bibsonomy Int. J. Uncertain. Fuzziness Knowl. Based Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Andrés Romero-Arellano, Ernesto Moya-Albor, Jorge Brieva, Iván Cruz-Aceves, Juan Gabriel Aviña-Cervantes, Martha Alicia Hernandez-Gonzalez, Luis Miguel Lopez-Montero Image Encryption and Decryption System through a Hybrid Approach Using the Jigsaw Transform and Langton's Ant Applied to Retinal Fundus Images. Search on Bibsonomy Axioms The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Suhui Liu, Jiguo Yu, Chunqiang Hu, Mengmeng Li Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Guangbo Wang, Feng Li, Pengcheng Wang, Yixiao Hu Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Chen Gao, Zidong Wang, Xiao He 0001, Hongli Dong Encryption-decryption-based consensus control for multi-agent systems: Handling actuator faults. Search on Bibsonomy Autom. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Atsushi Takayasu, Yohei Watanabe 0001 Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license