Skip to search formSkip to main contentSkip to account menu

Deterministic encryption

A deterministic encryption scheme (as opposed to a probabilistic encryption scheme) is a cryptosystem which always produces the same ciphertext for a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A… 
2017
2017
Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas… 
Review
2017
Review
2017
Over the past decade, big data analysis has seen an exponential growth and will certainly continue to witness spectacular… 
2017
2017
OF THE DISSERTATION Cryptanalytic Study of Property-Preserving Encryption by Fatma Betül Durak Dissertation Director: David Cash… 
2015
2015
Metric entropy is a computational variant of entropy, often used as a convenient substitute of HILL Entropy which is the standard… 
2012
2012
An information-theoretic private information retrieval (PIR) protocol allows a client to retrieve the i-th bit of a database… 
2012
2012
There are encryption schemes called searchable encryption schemes. We can prove the security of these schemes based on a security… 
2010
2010
Encrypted search — performing queries on protected data — is a well researched problem. However, existing solutions have inherent… 
1998
1998
(57) [summary] to disclose the encryption key generator having a high resistance to cryptanalysis or brute force attack. Further…