4 Questions 2 Answers 0 Followers
Questions related from Fawad Khan
Consider the scenario, that we have a Lookup table (LUT) which takes the desired value as input and output correspondingly the matched value in LUT. We don't want anyone to look into the LUT;...
10 October 2016 333 2 View
I need to know about any relevant papers/stuff or and research carried out in the field of cryptography / security on an encrypted non-tamper-able Look up Table. The table can be considered as a...
09 September 2016 5,471 2 View
Is there any good paper or research carried out till now that a data is encrypted by a single key or onwer(user) and their are 2 or more decryption keys. One key can decrypt the entire data. Other...
05 May 2016 6,675 3 View
symmetric key cipher (block or stream cipher) providing partial decryption of data at some points. Although the entire data is not been decrypted but the data decrypted to that specific point...
05 May 2016 4,748 4 View