Skip to search formSkip to main contentSkip to account menu

Adversary (cryptography)

Known as: Adversary 
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
A pursuer ship - interceptor equipped with sonar, searches adversary submarine and it detected a submarine's periscope at a sea… 
Highly Cited
2011
Highly Cited
2011
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains… 
Highly Cited
2010
Highly Cited
2010
The security of Vehicular Ad Hoc Networks (VANET) has mostly directed the attention of today research efforts, while… 
Highly Cited
2008
Highly Cited
2008
We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on… 
Highly Cited
2005
Highly Cited
2005
Networking unattended wireless sensors is expected to have significant impact on the efficiency of a large array of military and… 
Highly Cited
2004
Highly Cited
2004
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
2004
Highly Cited
2004
This paper analyses buyer‐supplier relationships from the perspective of small and medium‐sized enterprises (SMEs). Preliminary…