Search Results - "deterministic encryption"
-
1
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
Published in IEEE Access (2019-01-01)Subjects: “…deterministic encryption…”
Get full text
Article -
2
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Published in IEEE Access (2018-01-01)Subjects: “…deterministic encryption…”
Get full text
Article
