Search Results - "ciphertext"

Refine Results
  1. 1

    Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption by Mohd Satar, Siti Dhalila

    Published 2023
    “…This framework integrates an Ciphertext Policy Attribute-based Encryption (CP-ABE) with mechanisms aimed at optimizing the performance of access policy hiding process while strengthening the users’ privacy and streamlining data access processes. …”
    Get full text
    Get full text
  2. 2

    Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation by Hassan Disina, Abdulkadir, Jamel, Sapiee, Abubakar Pindar, Zahraddeen, Mat Deris, Mustafa

    Published 2018
    “…In this paper, generic Quasigroup sting transformation is analyzed and found vulnerable to Ciphertext-Only-Attack. An adversary can compute the ciphertext to get the plaintext without prior knowledge of the plaintext. …”
    Get full text
  3. 3

    Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme by Mohd Satar, Siti Dhalila, Mohamed, Mohamad Afendee, Hussin, Masnida, Mohd Hanapi, Zurina

    Published 2021
    “…Specifically, this paper enhance the Ciphertext Policy Attribute-Based Encryption (CP-ABE) scheme by adding two more modules which aims to provide fine-grained access control and offer privacy and integrity of data. …”
    Get full text
  4. 4

    Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption by Mohd Satar, Siti Dhalila, Hussin, Masnida, Mohd Hanapi, Zurina, Mohamed, Mohamad Afendee

    Published 2021
    “…These attributes were converted into scrambled data along with a ciphertext form that provides a better unreadability feature. …”
    Get full text
  5. 5

    A study of caesar cipher and transposition cipher in jawi messages by Mohd Lokman, Syiham, Chuah, Chai Wen, Ab. Rahman, Nurul Hidayah Binti, A. Hamid, Isredza Rahmi Binti

    Published 2018
    “…These terminologies in cryptography are plaintext/ messages, ciphertext, encryption, decryption and key. Encryption is a proses to transform the plaintext together with key into ciphertext. …”
    Get full text
  6. 6

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Cramer-Shoup is a practical public key cryptosystem provably secure against adaptive chosen ciphertext attack that requires a universal one-way hash function. …”
    Get full text
    Get full text
  7. 7

    Embedded PC based wireless communication using XTEA by Khok, Jess Lyn

    Published 2010
    “…This key is used to decrypt the ciphertext into its original data. When the receiver from the other PC enters the correct key, the ciphertext will be decrypted by the PIC18F15K50 microcontroller and the original data will be displayed in the GUI. …”
    Get full text
    Get full text
  8. 8

    Extention and cryptanalysis of golden cryptography by Sharabyan, Mohammad Tahghighi

    Published 2015
    “…Then a new extension to the original GC using discrete logarithm problem and hash function (GCHDLP) was proposed and the tests have shown that these versions of GC can resist the four basic attacks; the chosen plaintext attack, known-plaintext attack, the ciphertext-only attack, and chosen-ciphertext attack. …”
    Get full text
    Get full text
  9. 9

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Cryptography is a science of protecting information by changing it into unreadable format (encryption) called ciphertext using a key. The original message can be recovered from the ciphertext by means of decryption. …”
    Get full text
  10. 10

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…Also, the MKP increases the randomness of the ciphertext message, since the message is encrypted with distinct secret keys. …”
    Get full text
    Get full text
  11. 11

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…The aggregatable signcryption that enables special signcryption ciphertexts intended for the same destination be assembled in a compressed single ciphertext while maintaining the same security standards in the system. …”
    Get full text
    Get full text
  12. 12

    Network Security Encryption Techniques for Reliablility Data Transmission on Password System by Norrozila, Sulaiman, Ng, Liang Shen, M. A., Ameedeen

    Published 2013
    “…Because of its encrypted nature, eavesdroppers who may have access to the ciphertext will ideally be unable to uncover the message meaning. …”
    Get full text
    Get full text
  13. 13

    Passphrase with semantic noises and a proof on its higher information rate by Lee, Kok-Wah, Ewe, Hong-Tat

    Published 2007
    “…Unicity distance is the minimum size of ciphertext for unique decipherability of ciphertext when number of spurious keys is zero. …”
    Get full text
  14. 14

    Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher by Alfiya Khanum, R.M., Chitra, K., Noor Zuhaili, Md Yasin

    Published 2024
    “…A novel encryption mechanism known as Ciphertext Policy of topic has been developed. Attribute Based Encryption (CPABE) was developed as an alternative to password-based systems to address the challenges associated with secure data sharing, where users are required to know the password for each file they need. …”
    Get full text
    Get full text
    Get full text
  15. 15

    Randomized text encryption: a new dimension in cryptography by Memon, Jamshed, Abd Rozan, Mohd Zaidi, Uddin, Mueen, Abubakar, Adamu, Chiroma, Haruna, Daud, Dzurllkanian

    Published 2014
    “…The algorithm proposed increases the complexity of cryptanalyst to decrypt the ciphertext and restricts them to break the security of encoded file. …”
    Get full text
    Get full text
    Get full text
  16. 16

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…With the aid of image encryption algorithms, the plaintext of the image is encrypted into the ciphertext before sending. Only the authorized receiver can decrypt the ciphertext with the secret key(s) to obtain the plaintext. …”
    Get full text
    Get full text
  17. 17

    Related-mode attacks on block cipher modes of operation by Phan, , RCW, Siddiqi, , MU

    Published 2005
    “…Typically only one chosen plaintext/ciphertext query is required, while computational complexity is negligible. …”
    Get full text
  18. 18

    A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion by Muda, Zaiton, Ab. Ahfaidha, Abdeladeem, Udzir, Nur Izura, Mahmod, Ramlan

    Published 2013
    “…The method involves inserting random bits into the ciphertext followed by bit rotation and XORing bitwise. …”
    Get full text
    Get full text
  19. 19

    k-Resilient Identity-Based Encryption in the Standard Model by HENG, S.-H.

    Published 2006
    “…We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. …”
    Get full text
  20. 20

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Cryptographic ciphers depend on how quickly the key affects the output of the ciphers (ciphertext). Keys are traditionally generated from small size input (seed) to a bigger size random key(s). …”
    Get full text
    Get full text
    Get full text
    Get full text