Sciweavers

2108 search results - page 7 / 422
» Encrypted
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 6 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
96
Voted
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Lightweight JPEG2000 Encryption with Anisotropic Wavelet Packets
A lightweight encryption technique for JPEG2000 with optional support for transparent encryption is proposed. Randomized anisotropic wavelet packet bases are used to construct a s...
Dominik Engel, Andreas Uhl
82
Voted
ESORICS
2005
Springer
15 years 6 months ago
Security Notions for Disk Encryption
We define security goals and attack models for disk encryption, and prove several relationships between the resulting security notions, and some general results about disk encryp...
Kristian Gjøsteen
87
Voted
CRYPTO
2008
Springer
107views Cryptology» more  CRYPTO 2008»
15 years 2 months ago
Circular-Secure Encryption from Decision Diffie-Hellman
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a "key cy...
Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Os...
JCIT
2008
130views more  JCIT 2008»
15 years 20 days ago
Group-oriented Encryption Secure against Collude Attack
A group oriented encryption scheme is presented in this paper. In this scheme, a sender is allowed to encrypt a message using the group public key and send the ciphertext to the gr...
Chunbo Ma, Jun Ao