Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,232,143 papers from all fields of science
Search
Sign In
Create Free Account
Honey Encryption
Honey Encryption is a type of data encryption that "produces a ciphertext, which, when decrypted with an incorrect key as guessed by the attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Brute-force attack
Ciphertext
Eurocrypt
Known-plaintext attack
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Honey Encryption : implementation challenges and solutions
Ronja Lindholm
2019
Corpus ID: 198313783
Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence…
Expand
2018
2018
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Khin Su Myat Moe
,
Thanda Win
International Conference on Electrical…
2018
Corpus ID: 58673858
In the era of digitization, data security is a vital role in message transmission and all systems that deal with users require…
Expand
2018
2018
Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Thanda Win
,
Khin Su Myat Moe
2018
Corpus ID: 54833270
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through…
Expand
2017
2017
Honey Encryption for Language
M. Beunardeau
,
Houda Ferradi
,
R. Géraud
,
D. Naccache
IACR Cryptology ePrint Archive
2017
Corpus ID: 37315491
Honey Encryption (HE), introduced by Juels and Ristenpart (Eurocrypt 2014, [13]), is an encryption paradigm designed to produce…
Expand
2017
2017
Improving Security of Honey Encryption in Database: Implementation
S. Murty
,
Mona Mulchandani
2017
Corpus ID: 64853368
Honey encryption is another encryption plot that gives flexibility against animal compels assault by guaranteeing that messages…
Expand
2017
2017
허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석
지창환
,
윤지원
2017
Corpus ID: 75011138
허니암호(HE:Honey Encryption)는 기존의 패스워드 기반 암호(PBE:Password Based Encryption)의 무차별 대입 공격(Brute Force Attack…
Expand
2017
2017
An innovative encryption method for images using RSA, honey encryption and inaccuracy tolerant system using Hamming codes
C. J. N. Cheltha
International Conference on Computation of Power…
2017
Corpus ID: 43987161
In modern era we are transmitting images through communication channel. Some of the examples in which images should be secure are…
Expand
2016
2016
Message partitioning and limited auxiliary randomness: Alternatives to Honey Encryption
AmirEmad Ghassami
,
Daniel Cullina
,
N. Kiyavash
International Symposium on Information Theory
2016
Corpus ID: 2938874
In a symmetric-key cryptography system, it is often required to transmit a nonuniform message from a very large set. In this case…
Expand
Review
2016
Review
2016
A Review on Common Encryption Techniques to Brute Force Shielded Technique: Honey Encryption
Taunk Mayur
,
Laxmi Saraswat
2016
Corpus ID: 7447156
In today’s era of information technology beginning from social network to most complex and secure transactions are going on the…
Expand
Review
2016
Review
2016
Review on Honey Encryption Technique
N. Noorunnisa
,
R. Afreen
2016
Corpus ID: 3992615
: Users mostly select common passwords which are easy to remember and easy to guess. Passwords are often protected in the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE