Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,624 papers from all fields of science
Search
Sign In
Create Free Account
Honey Encryption
Honey Encryption is a type of data encryption that "produces a ciphertext, which, when decrypted with an incorrect key as guessed by the attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Brute-force attack
Ciphertext
Eurocrypt
Known-plaintext attack
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
A comprehensive review of honey encryption scheme
Esther Omolara Abiodun
,
A. Jantan
,
Isaac Oludare Abiodun
,
H. Poston
Indonesian Journal of Electrical Engineering and…
2019
Corpus ID: 196162119
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey Encryption is an encryption scheme that provides…
Expand
2018
2018
Data migration in cloud computing using honey encryption
K.Ravindranadh
,
M. S. Kiran
,
B. Durga
,
Sai Pavan Kumar
,
D. Priyanka
2018
Corpus ID: 56035700
Cloud computing provides various kinds of services for storing data, load balancing between clouds and provides an infrastructure…
Expand
2018
2018
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Khin Su Myat Moe
,
Thanda Win
International Conference on Electrical…
2018
Corpus ID: 58673858
In the era of digitization, data security is a vital role in message transmission and all systems that deal with users require…
Expand
2017
2017
Honey Encryption for Language
M. Beunardeau
,
Houda Ferradi
,
R. Géraud
,
D. Naccache
IACR Cryptology ePrint Archive
2017
Corpus ID: 37315491
Honey Encryption (HE), introduced by Juels and Ristenpart (Eurocrypt 2014, [13]), is an encryption paradigm designed to produce…
Expand
2017
2017
Improving Security of Honey Encryption in Database: Implementation
S. Murty
,
Mona Mulchandani
2017
Corpus ID: 64853368
Honey encryption is another encryption plot that gives flexibility against animal compels assault by guaranteeing that messages…
Expand
Review
2016
Review
2016
Review on Honey Encryption Technique
N. Noorunnisa
,
R. Afreen
2016
Corpus ID: 3992615
: Users mostly select common passwords which are easy to remember and easy to guess. Passwords are often protected in the…
Expand
2016
2016
Message partitioning and limited auxiliary randomness: Alternatives to Honey Encryption
AmirEmad Ghassami
,
Daniel Cullina
,
N. Kiyavash
International Symposium on Information Theory
2016
Corpus ID: 2938874
In a symmetric-key cryptography system, it is often required to transmit a nonuniform message from a very large set. In this case…
Expand
2016
2016
Honey chatting: A novel instant messaging system robust to eavesdropping over communication
Joo-Im Kim
,
J. Yoon
IEEE International Conference on Acoustics…
2016
Corpus ID: 1900997
There have been many efforts to strengthen security of Instant Messaging (IM) system. One of the typical technologies is the…
Expand
Highly Cited
2014
Highly Cited
2014
Honey Encryption: Security Beyond the Brute-Force Bound
A. Juels
,
Thomas Ristenpart
IACR Cryptology ePrint Archive
2014
Corpus ID: 14127621
We introduce honey encryption (HE), a simple, general approach to encrypting messages using low min-entropy keys such as…
Expand
Highly Cited
2014
Highly Cited
2014
Honey Encryption: Encryption beyond the Brute-Force Barrier
A. Juels
,
Thomas Ristenpart
IEEE Security and Privacy
2014
Corpus ID: 16797351
Honey encryption (HE) addresses the challenge of encrypting messages using keys that are vulnerable to guessing attacks, such as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required