Skip to search formSkip to main contentSkip to account menu

Convergent encryption

Convergent encryption, also known as content hash keying, is a cryptosystem that produces identical ciphertext from identical plaintext files. This… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
De-duplication is a common methodology which is been used for eliminating out the similar copies of same or repeating data in… 
Review
2016
Review
2016
Background/Objectives: Data deduplication is the elimination of redundant data within an existing environment. It is mainly used… 
2009
2009
Traditionally, backup and archiving have been performed on tapes. With the rapid advances in disk storage technology witnessed in… 
2007
2007
When a sensor network is deployed for monitoring a protected region, topology control is usually used to save energy consumption… 
1995
1995
In this paper we consider probabilities of different asymptotics of convergent unlearning algorithm for the Hopfield-type neural… 
1973
1973
An investigation to determine the performance, in terms of thrust minus nozzle axial force, of a lobed-daisy mixer nozzle has… 
1973
1973
We discuss a nonlinear difference scheme for approximating the solution of the initial value problem for linear partial… 
1971
1971
The Vlssov-Poisson equat ions a r e solved by a nonres t r i c t ive hybrid calculat i o n . Over and above known phenomena, r e…