Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,035,412 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext expansion
In cryptography, the term ciphertext expansion refers to the length increase of a message when it is encrypted. Many modern cryptosystems cause some…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Ciphertext
Cryptography
Data compression
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
PixSel: Images as Book Cipher Keys
Mykel Shumay
,
Gautam Srivastava
2018
Corpus ID: 201712283
In this paper we introduce a novel encryption technique, which we call PixSel. This technique uses images in place of literature…
Expand
2018
2018
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Gil Segev
,
Ido Shahaf
IACR Cryptology ePrint Archive
2018
Corpus ID: 51603021
Order-preserving encryption emerged as a key ingredient underlying the security of practical database management systems…
Expand
2017
2017
Semi-order preserving encryption
Ce Yang
,
Weiming Zhang
,
Nenghai Yu
Information Sciences
2017
Corpus ID: 37404938
2017
2017
Plaintext-Dependent Selective Image Encryption Scheme Based on Chaotic Maps and DNA Coding
Lin Li
,
Yingying Yao
,
Xiaolin Chang
International Conferences on Dependable Systems…
2017
Corpus ID: 43761889
With the rapid development of Multimedia technology, the secure transmission of digital images over the Internet has become more…
Expand
2013
2013
Cryptanalysis of a Public Key Cryptosystem Based on the Matrix Combinatorial Problem
M. Lee
Informatica
2013
Corpus ID: 5887188
In this paper, we present a cryptanalysis of a public key cryptosystem based on the matrix combinatorial problem proposed by Wang…
Expand
2013
2013
Chosen Ciphertext Secure (CCS): Stateful Symmetric Key CCA Encryption with Minimal Ciphertext Expansion
J. Trostle
IACR Cryptology ePrint Archive
2013
Corpus ID: 16175329
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We…
Expand
2012
2012
An efficient IND-CCA2 secure Paillier-based cryptosystem
Angsuman Das
,
A. Adhikari
Information Processing Letters
2012
Corpus ID: 7290364
2011
2011
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes
J. Baek
,
Cheng-Kang Chu
,
Jianying Zhou
The Cryptographer's Track at RSA Conference
2011
Corpus ID: 42255553
We present new constructions of (conventional) public key and stateful public key encryption schemes which produce ciphertexts of…
Expand
2009
2009
A New Knapsack Public-Key Cryptosystem
Weidong Zhang
,
Baocang Wang
,
Yu-pu Hu
Fifth International Conference on Information…
2009
Corpus ID: 12972171
A new knapsack-type public key cryptosystem is proposed by constructing an easy knapsack problem. The cryptosystem is shown to be…
Expand
2008
2008
Efficient public key encryption with smallest ciphertext expansion from factoring
Hai-feng Qian
,
Yuan Zhou
,
Zhi-bin Li
,
Zecheng Wang
,
Bing Zhang
Des. Codes Cryptogr.
2008
Corpus ID: 29869088
For public key encryption schemes, adaptive chosen ciphertext security is a widely accepted security notion since it captures a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE