Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Chenglin Wu, Zhaoyang Li |
Local thinning of 3D stereo images based on symmetric decryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 82, pp. 103803, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Yudi Zhang 0001, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Kuei-Fang Hsiao |
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 39(2), pp. 384-395, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Huiyu Qiu, Shuxin Wei, Hao Liu, Beibei Zhan, Huizhen Yan, Wei Lu, Jiawei Zhang, Si Wu, Tao Chen 0029 |
Programming Multistate Aggregation-Induced Emissive Polymeric Hydrogel into 3D Structures for On-Demand Information Decryption and Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Intell. Syst. ![In: Adv. Intell. Syst. 3(6), pp. 2000239, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | S. Reshma, K. Shaila, K. R. Venugopal 0001 |
VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 119(3), pp. 2675-2694, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Aryan Verma |
Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.02270, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer 0001 |
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.09828, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Dayane Reis, Haoran Geng, Michael T. Niemier, Xiaobo Sharon Hu |
IMCRYPTO: An In-Memory Computing Fabric for AES Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2112.02231, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Javier Yuste, Sergio Pastrana |
Avaddon ransomware: an in-depth analysis and decryption of infected systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.04796, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Zhishuo Zhang, Wei Zhang 0205, Zhiguang Qin |
A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 123, pp. 181-195, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Zhishuo Zhang, Wei Zhang 0205, Zhiguang Qin |
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 6676862:1-6676862:16, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Hassan El Gafif, Ahmed Toumanari |
Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 8834616:1-8834616:17, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Xieyang Shen, Chuanhe Huang, Xiajiong Shen, Jiaoli Shi, Danxin Wang |
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 7249470:1-7249470:11, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Raya Basil Alothman, Imad Ibraheem Saada, Basma Salim Bazel Al-Brge |
A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cases Inf. Technol. ![In: J. Cases Inf. Technol. 24(2), pp. 1-18, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Amal Hafsa, Mohamed Gafsi, Jihene Malek, Mohsen Machhout |
FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Program. ![In: Sci. Program. 2021, pp. 6610655:1-6610655:20, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Ferran Alborch, Ramiro Martínez, Paz Morillo |
RLWE-based distributed key generation and threshold decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1694, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Tjerand Silde |
Verifiable Decryption for BGV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1693, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart |
Gladius: LWR based efficient hybrid public key encryption with distributed decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 96, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | |
A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 516, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Thomas Haines, Johannes Müller 0001 |
Optimal Randomized Partial Checking for Decryption Mix Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 520, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Kristian Gjøsteen, Thomas Haines, Johannes Müller 0001, Peter B. Rønne, Tjerand Silde |
Verifiable Decryption in the Head. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 558, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko |
Homomorphic decryption in blockchains via compressed discrete-log lookup tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 899, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Chinmoy Biswas, Ratna Dutta |
Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1431, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Jan-Pieter D'Anvers, Senne Batsleer |
Multitarget decryption failure attacks and their application to Saber and Kyber. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 193, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Javier Yuste, Sergio Pastrana |
Avaddon ransomware: An in-depth analysis and decryption of infected systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 109, pp. 102388, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Burak Filiz, Budi Arief, Orçun Çetin, Julio C. Hernandez-Castro |
On the Effectiveness of Ransomware Decryption Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 111, pp. 102469, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Ali Abdulwahhab Mohammed, Haitham A. Anwer |
A New Method Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Webology ![In: Webology 18(1), pp. 20-31, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Majid Mumtaz, Ping Luo 0004 |
An improved cryptanalysis of large RSA decryption exponent with constrained secret key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 14(2), pp. 102-117, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera |
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 24(2), pp. 1525-1550, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Hui Cui 0001, Russell Paulet, Surya Nepal, Xun Yi, Butrus Mbimbi |
Two-Factor Decryption: A Better Way to Protect Data Security and Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 64(4), pp. 550-563, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Cong Peng 0005, Jianhua Chen 0002, Pandi Vijayakumar, Neeraj Kumar 0001, Debiao He |
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 21(1), pp. 19:1-19:23, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Xin Huang, David Arnold 0006, Tianyang Fang, Jafar Saniie |
A Chaotic-based Encryption/Decryption System for Secure Video Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: IEEE International Conference on Electro Information Technology, EIT 2021, Mt. Pleasant, MI, USA, May 14-15, 2021, pp. 369-373, 2021, IEEE, 978-1-6654-1846-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Josef Kokes, Jonatan Matejka, Róbert Lórencz |
Automatic Detection and Decryption of AES by Monitoring S-Box Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021., pp. 172-180, 2021, SCITEPRESS, 978-989-758-491-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Majid Mumtaz, Ping Luo 0004 |
Cryptanalysis of a Special Case of RSA Large Decryption Exponent Using Lattice Basis Reduction Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: 6th IEEE International Conference on Computer and Communication Systems, ICCCS 2021, Chengdu, China, April 23-26, 2021, pp. 714-720, 2021, IEEE, 978-1-6654-1256-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Rocío Rodriguez G., Gerardo Castang M., Carlos A. Vanegas |
Information Encryption and Decryption Analysis, Vulnerabilities and Reliability Implementing the RSA Algorithm in Python. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAI ![In: Applied Informatics - Fourth International Conference, ICAI 2021, Buenos Aires, Argentina, October 28-30, 2021, Proceedings, pp. 391-404, 2021, Springer, 978-3-030-89653-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Jutiphat Chatsomsanga, Chawalit Benjangkaprasert |
Malware Developing Guide: Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 23rd International Conference on Advanced Communication Technology, ICACT 2021, Pyeongchang, South Korea, February 7-10, 2021, pp. 275-278, 2021, IEEE, 979-11-88428-06-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Habeeb Syed, Imtiyazuddin Shaik, Nitesh Emmadi, Harika Narumanchi, Meena Singh Dilip Thakur, Rajan Mindigal Alasingara Bhattachar |
WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 17th International Conference, ICISS 2021, Patna, India, December 16-20, 2021, Proceedings, pp. 185-197, 2021, Springer, 978-3-030-92570-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart |
Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV, pp. 125-155, 2021, Springer, 978-3-030-92067-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Haines, Johannes Müller 0001 |
Optimal Randomized Partial Checking for Decryption Mix Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings, pp. 277-292, 2021, Springer, 978-3-030-90566-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Dominik Ziegler 0001, Alexander Marsalek, Gerald Palfinger |
White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021, pp. 331-338, 2021, IEEE, 978-1-6654-1658-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh |
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCISC ![In: 18th International ISC Conference on Information Security and Cryptology, ISCISC 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021, pp. 81-88, 2021, IEEE, 978-1-6654-1329-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko |
Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DPM/CBT@ESORICS ![In: Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers, pp. 328-339, 2021, Springer, 978-3-030-93943-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Eric Sakk, Shuangbao Paul Wang |
Code Structures for Quantum Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP ![In: 5th IEEE International Conference on Cryptography, Security and Privacy, CSP 2021, Zhuhai, China, January 8-10, 2021, pp. 7-11, 2021, IEEE, 978-1-7281-8621-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Amal Hafsa, Jihene Malek, Mohsen Machhout |
Performance trade-offs of hybrid cryptosystem for medical images encryption - decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSD ![In: 18th International Multi-Conference on Systems, Signals & Devices, SSD 2021, Monastir, Tunisia, March 22-25, 2021, pp. 1221-1229, 2021, IEEE, 978-1-6654-1493-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Michil P. Egorov, Anastasia A. Funkner |
Automatic Extraction and Decryption of Abbreviations from Domain-Specific Texts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
pHealth ![In: pHealth 2021 - Proceedings of the 18th International Conference on Wearable Micro and Nano Technologies for Personalized Health - 8-10 November 2021, Genoa, Italy, pp. 281-284, 2021, IOS Press, 978-1-64368-226-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Huanyu Ma, Shuai Han 0001, Hao Lei |
Optimized Paillier's Cryptosystem with Fast Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021, pp. 106-118, 2021, ACM, 978-1-4503-8579-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Chaosheng Feng, Keping Yu, Moayad Aloqaily, Mamoun Alazab, Zhihan Lv, Shahid Mumtaz |
Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 69(11), pp. 13784-13795, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera |
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 51, pp. 102435, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Mriganka Mandal |
Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 55, pp. 102666, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Giyoon Kim, Myungseo Park, Sehoon Lee, Younjai Park, Insoo Lee, Jongsung Kim |
A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 35, pp. 300998, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Myungseo Park, Okyeon Yi, Jongsung Kim |
A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 35, pp. 301026, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Sudhanshu Suhas Gonge |
Combination of neural network and advanced encryption and decryption technique is used for digital image watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 38(5), pp. 6465-6474, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Natasa Zivic, Obaid Ur Rehman 0002 |
Iterative self-correction for secured images using turbo codes and soft input decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 38(2), pp. 1841-1854, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Beáta Megyesi, Bernhard Esslinger, Alicia Fornés, Nils Kopal, Benedek Láng, George Lasry, Karl de Leeuw, Eva Pettersson, Arno Wacker, Michelle Waldispühl |
Decryption of historical manuscripts: the DECRYPT project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 44(6), pp. 545-559, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jiguo Li 0001, Yao Wang, Yichen Zhang 0003, Jinguang Han |
Full Verifiability for Outsourced Decryption in Attribute Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 13(3), pp. 478-487, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Huaqun Wang, Debiao He, Jinguang Han |
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 13(3), pp. 572-583, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Edward Yellakuor Baagyere, Peter Awon-Natemi Agbedemnab, Zhen Qin 0002, Mohammed Ibrahim Daabo, Zhiguang Qin |
A Multi-Layered Data Encryption and Decryption Scheme Based on Genetic Algorithm and Residual Numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 100438-100447, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Yongjian Liao, Ganglin Zhang, Hongjie Chen |
Cost-Efficient Outsourced Decryption of Attribute-Based Encryption Schemes for Both Users and Cloud Server in Green Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 20862-20869, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Minkyu Lee, Euee Seon Jang |
Start Code-Based Encryption and Decryption Framework for HEVC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 202910-202918, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Alamgir Sardar, Saiyed Umer, Chiara Pero, Michele Nappi |
A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 105263-105277, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Zhen Guo, Bin Liu, Kaiqiang Zhao, Chaosheng Feng |
Comment on "An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 202483-202486, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Hanlin Zhang, Jia Yu 0005, Chengliang Tian, Le Tong, Jie Lin 0002, Linqiang Ge, Huaqun Wang |
Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 7(8), pp. 6868-6881, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Damien Vergnaud |
Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 7(11), pp. 11327-11329, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ahmet Can Mert, Erdinç Öztürk, Erkay Savas |
Design and Implementation of Encryption/Decryption Architectures for BFV Homomorphic Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 28(2), pp. 353-362, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Sakshi Patel, Bharath K. P, Rajesh Kumar Muthu |
Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 79(43-44), pp. 31739-31757, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Qutaibah M. Malluhi, Vinh Duc Tran, Viet Cuong Trinh |
Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 12(6), pp. 969, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro |
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 841, pp. 62-83, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu |
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 809, pp. 103-136, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Xin Zheng 0001, Chongyao Xu, Xianghong Hu, Yun Zhang 0001, Xiaoming Xiong |
The Software/Hardware Co-Design and Implementation of SM2/3/4 Encryption/Decryption and Digital Signature System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10), pp. 2055-2066, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Shuo Zhang 0008, Wenmin Li 0001, Qiaoyan Wen, Hua Zhang 0001, Zhengping Jin |
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 114(4), pp. 2783-2800, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Pragya Mishra, Renuka, Vandani Verma |
Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 115(2), pp. 961-969, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Chirag Gupta |
Shallow Encoder Deep Decoder (SEDD) Networks for Image Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2001.03017, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Sakshi Patel, Bharath K. P, Rajesh Kumar Muthu |
Image Encryption Decryption Using Chaotic Logistic Mapping and DNA Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2003.06616, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan |
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.10952, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Yi Ding 0003, Guozheng Wu, Dajiang Chen, Ning Zhang 0007, Linpeng Gong, Mingsheng Cao, Zhiguang Qin |
DeepEDN: A Deep Learning-based Image Encryption and Decryption Network for Internet of Medical Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.05523, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Yi Ding 0003, Fuyuan Tan, Zhen Qin 0002, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin |
DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2012.11097, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Xuanmei Qin, Yongfeng Huang 0001, Xing Li 0001 |
An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 24(24), pp. 18881-18891, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Rui Guo 0005, Chaoyuan Zhuang, Huixian Shi, Yinghui Zhang 0002, Dong Zheng 0001 |
A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 16(2), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Hui Cui 0001, Zhiguo Wan, Xinlei Wei, Surya Nepal, Xun Yi |
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 15, pp. 3227-3238, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ibrahim Yasser, Mohamed Azim Mohamed, Ahmed Shaban Samrah, Fahmi Khalifa |
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 22(11), pp. 1253, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Mohamed Gafsi, Nessrine Abbassi, Mohamed Ali Hajjaji, Jihene Malek, Abdellatif Mtibaa |
Improved Chaos-Based Cryptosystem for Medical Image Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Program. ![In: Sci. Program. 2020, pp. 6612390:1-6612390:22, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks |
CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1548, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | John M. Schanck |
An upper bound on the decryption failure rate of static-key NewHope. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 326, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Marios Georgiou 0001, Mark Zhandry |
Unclonable Decryption Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 877, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Xavier Boyen, Thomas Haines, Johannes Müller 0001 |
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 115, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Ying Guo, Zhenfu Cao, Xiaolei Dong |
A Generalization of Paillier's Public-Key System With Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 796, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Marcel Tiepelt, Jan-Pieter D'Anvers |
Exploiting Decryption Failures in Mersenne Number Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 367, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Chiranji Lal Chowdhary, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique 0001, P. Kumaresan, Muhammad Fazal Ijaz |
Analytical Study of Hybrid Techniques for Image Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(18), pp. 5162, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Hui Zheng, Jun Shao 0001, Guiyi Wei |
Attribute-based encryption with outsourced decryption in blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 13(5), pp. 1643-1655, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Kazuhiko Minematsu |
Fast Decryption: a New Feature of Misuse-Resistant AE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2020(3), pp. 87-118, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Marcel Tiepelt, Jan-Pieter D'Anvers |
Exploiting Decryption Failures in Mersenne Number Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APKC@AsiaCCS ![In: Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020, pp. 45-54, 2020, ACM, 978-1-4503-7607-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Nina Bindel, John M. Schanck |
Decryption Failure Is More Likely After Success. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings, pp. 206-225, 2020, Springer, 978-3-030-44222-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ti Wang, Yongbin Zhou, Hui Ma 0002, Yuejun Liu, Rui Zhang 0002 |
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers, pp. 83-103, 2020, Springer, 978-3-030-71851-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jianhua Zeng, Yanlin Zhan, Jianrong Yang |
Encryption and Decryption of Optical Images with Different Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIAM ![In: AIAM2020: 2nd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 15-17, 2020, pp. 256-265, 2020, ACM, 978-1-4503-7553-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ankit Pradhan, R. Punith, Kamalakanta Sethi, Padmalochan Bera |
Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2020, Dublin, Ireland, June 15-19, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-6690-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Nan Wan, Yi Zhang |
Digital Image Encryption and Decryption Algorithm Based on Optimization and Fusion Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCID ![In: 13th International Symposium on Computational Intelligence and Design, ISCID 2020, Hangzhou, China, December 12-13, 2020, pp. 244-248, 2020, IEEE, 978-1-7281-8446-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Lijun Zhang, Cheng Tan, Fei Yu |
Fast Decryption of Excel Document Encrypted by RC4 Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 20th IEEE International Conference on Communication Technology, ICCT 2020, Nanning, China, October 28-31, 2020, pp. 1572-1576, 2020, IEEE, 978-1-7281-8141-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jie Luo, Qingbing Ji |
Password Acquisition and Traffic Decryption Based on L2TP/IPSec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 20th IEEE International Conference on Communication Technology, ICCT 2020, Nanning, China, October 28-31, 2020, pp. 1567-1571, 2020, IEEE, 978-1-7281-8141-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks |
CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I, pp. 159-190, 2020, Springer, 978-3-030-64836-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Qian Guo 0001, Thomas Johansson 0001 |
A New Decryption Failure Attack Against HQC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I, pp. 353-382, 2020, Springer, 978-3-030-64836-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Rujia Li, Qin Wang 0008, Feng Liu, Qi Wang 0012, David Galindo |
An Accountable Decryption System Based on Privacy-Preserving Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings, pp. 372-390, 2020, Springer, 978-3-030-62973-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|