Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes | IEEE Journals & Magazine | IEEE Xplore