Skip to search formSkip to main contentSkip to account menu

Adversary (cryptography)

Known as: Adversary 
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
A pursuer ship - interceptor equipped with sonar, searches adversary submarine and it detected a submarine's periscope at a sea… 
Highly Cited
2010
Highly Cited
2010
Anonymization of social networks before they are published or shared has become an important research question. Recent work on… 
Highly Cited
2010
Highly Cited
2010
The family of WG stream ciphers has good randomness properties. In this paper, we parameterize WG-7 stream cipher for RFID tags… 
Highly Cited
2005
Highly Cited
2005
Networking unattended wireless sensors is expected to have significant impact on the efficiency of a large array of military and… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
2004
Highly Cited
2004
This paper analyses buyer‐supplier relationships from the perspective of small and medium‐sized enterprises (SMEs). Preliminary… 
Highly Cited
1987
Highly Cited
1987
Open systems, now common in many small computers, have given the user logical access to all parts of his or her system. At the… 
Highly Cited
1982
Highly Cited
1979
Highly Cited
1979
Lower bounds are derived on the number of comparisons to solve several well-known selection problems Among the problems are…