Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,296,515 papers from all fields of science
Search
Sign In
Create Free Account
Honey Encryption
Honey Encryption is a type of data encryption that "produces a ciphertext, which, when decrypted with an incorrect key as guessed by the attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Brute-force attack
Ciphertext
Eurocrypt
Known-plaintext attack
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Honey Encryption : implementation challenges and solutions
Ronja Lindholm
2019
Corpus ID: 198313783
Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence…
Expand
2019
2019
DATA SECURITY IN CLOUD STORAGE USING ADVANCED ENCRYPTION STANDARD AND HONEY CRYPTOGRAPHY
S. Arun
,
N. Shanker
2019
Corpus ID: 165157963
In Cloud computing, data security has an important role in the communication system development. Network security has become a…
Expand
2018
2018
Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Thanda Win
,
Khin Su Myat Moe
2018
Corpus ID: 54833270
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through…
Expand
2017
2017
Honey Encryption for Language
M. Beunardeau
,
Houda Ferradi
,
R. Géraud
,
D. Naccache
IACR Cryptology ePrint Archive
2017
Corpus ID: 37315491
Honey Encryption (HE), introduced by Juels and Ristenpart (Eurocrypt 2014, [13]), is an encryption paradigm designed to produce…
Expand
2017
2017
An innovative encryption method for images using RSA, honey encryption and inaccuracy tolerant system using Hamming codes
C. J. N. Cheltha
International Conference on Computation of Power…
2017
Corpus ID: 43987161
In modern era we are transmitting images through communication channel. Some of the examples in which images should be secure are…
Expand
2017
2017
허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석
지창환
,
윤지원
2017
Corpus ID: 75011138
허니암호(HE:Honey Encryption)는 기존의 패스워드 기반 암호(PBE:Password Based Encryption)의 무차별 대입 공격(Brute Force Attack…
Expand
2017
2017
Implementing the Honey Encryption for Securing Public Cloud Data Storage
Edwin Mok
,
A. Samsudin
,
S. Tan
2017
Corpus ID: 58962574
Recent security incidents on public cloud data storage had risen concerns on cloud data security. Existing cloud data protection…
Expand
2016
2016
Message partitioning and limited auxiliary randomness: Alternatives to Honey Encryption
AmirEmad Ghassami
,
Daniel Cullina
,
N. Kiyavash
International Symposium on Information Theory
2016
Corpus ID: 2938874
In a symmetric-key cryptography system, it is often required to transmit a nonuniform message from a very large set. In this case…
Expand
Review
2016
Review
2016
A Review on Common Encryption Techniques to Brute Force Shielded Technique: Honey Encryption
Taunk Mayur
,
Laxmi Saraswat
2016
Corpus ID: 7447156
In today’s era of information technology beginning from social network to most complex and secure transactions are going on the…
Expand
2016
2016
Honey Encryption for Language - Robbing Shannon to Pay Turing?
M. Beunardeau
,
Houda Ferradi
,
R. Géraud
,
D. Naccache
International Conference on Cryptology in…
2016
Corpus ID: 226742
Honey Encryption (HE), introduced by Juels and Ristenpart (Eurocrypt 2014, [12]), is an encryption paradigm designed to produce…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE