Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,973,196 papers from all fields of science
Search
Sign In
Create Free Account
Adversary (cryptography)
Known as:
Adversary
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Alice and Bob
Authentication
Block cipher
CHAOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Programming the robot in tasks of inspection and interception
G. Alferov
,
O. Malafeyev
,
A. Maltseva
International Conference on Mechanics - Seventh…
2015
Corpus ID: 19932736
A pursuer ship - interceptor equipped with sonar, searches adversary submarine and it detected a submarine's periscope at a sea…
Expand
Highly Cited
2012
Highly Cited
2012
Security improvement on an anonymous key agreement protocol based on chaotic maps
Kaiping Xue
,
P. Hong
2012
Corpus ID: 62596927
Highly Cited
2010
Highly Cited
2010
Privacy in dynamic social networks
Smriti Bhagat
,
Graham Cormode
,
B. Krishnamurthy
,
D. Srivastava
The Web Conference
2010
Corpus ID: 17657062
Anonymization of social networks before they are published or shared has become an important research question. Recent work on…
Expand
Highly Cited
2010
Highly Cited
2010
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication
Yiyuan Luo
,
Qi Chai
,
G. Gong
,
Xuejia Lai
IEEE Global Telecommunications Conference…
2010
Corpus ID: 17689343
The family of WG stream ciphers has good randomness properties. In this paper, we parameterize WG-7 stream cipher for RFID tags…
Expand
Highly Cited
2005
Highly Cited
2005
Information assurance in wireless sensor networks
S. Olariu
,
Qingwen Xu
IEEE International Parallel and Distributed…
2005
Corpus ID: 16232114
Networking unattended wireless sensors is expected to have significant impact on the efficiency of a large array of military and…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2004
Highly Cited
2004
A study of procurement behaviour in small firms
B. Morrissey
,
L. Pittaway
2004
Corpus ID: 18481435
This paper analyses buyer‐supplier relationships from the perspective of small and medium‐sized enterprises (SMEs). Preliminary…
Expand
Highly Cited
1987
Highly Cited
1987
Physical Security for the μABYSS System
Steve H. Weingart
IEEE Symposium on Security and Privacy
1987
Corpus ID: 14824345
Open systems, now common in many small computers, have given the user logical access to all parts of his or her system. At the…
Expand
Highly Cited
1982
Highly Cited
1982
Adversary arguments and the logic of personal attacks
M. Flowers
,
R. McGuire
,
L. Birnbaum
1982
Corpus ID: 57886635
Highly Cited
1979
Highly Cited
1979
A Counting Approach to Lower Bounds for Selection Problems
Frank Fussenegger
,
H. Gabow
JACM
1979
Corpus ID: 7868196
Lower bounds are derived on the number of comparisons to solve several well-known selection problems Among the problems are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE