Adversary (cryptography)

Known as: Adversary 
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1965-2017
0500100019652017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
We study three classical machine learning algorithms in the context of algorithmic fairness: adaptive boosting, support vector… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Review
2016
Review
2016
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need… (More)
  • figure 1
  • table 1
Is this relevant?
Review
2016
Review
2016
Cooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VANETs), are among the key… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Cryptography Ueli Maurer Renato Renner Department of Computer Science, ETH Zurich, Switzerland Institute for Theoretical Physics… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a… (More)
  • figure 1
  • table I
  • table II
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Recent research has considered DNA as a medium for ultra-scale computation and for ultracompact information storage. One… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The goal of this paper is to introduce a simple verifiable secret sharing scheme, to improve the efficiency of known secure… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 7
Is this relevant?