Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Adversary (cryptography)

Known as: Adversary 
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
As an important problem in computer vision, salient object detection (SOD) from images has been attracting an increasing amount… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2017
Highly Cited
2017
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neural networks are vulnerable… Expand
  • figure 1
  • table I
  • table II
  • figure 2
  • table III
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Several machine learning models, including neural networks, consistently misclassify adversarial examples---inputs formed by… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a… Expand
  • figure 1
  • table I
  • figure 2
  • table III
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot protect against attacks that… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of… Expand
Is this relevant?
Highly Cited
1990
Highly Cited
1990
We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two… Expand
Is this relevant?
Highly Cited
1975
Highly Cited
1975
CIVIL rights legislation, the attendant actions of compliance agencies, and a few landmark court cases have provided the impetus… Expand
Is this relevant?