“…Usually, we apply two sequential operations: first, we apply data compression to save disk space and to reduce transmission costs, and second, data ciphering to provide confidentiality. This solution works fine to most applications, but we have to execute two expensive operations, and if we want to access data, we must first decipher and then decompress the ciphertext to restore information [1].…”