Skip to search formSkip to main contentSkip to account menu

Adversary (cryptography)

Known as: Adversary 
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
We propose a general framework for increasing local stability of Artificial Neural Nets (ANNs) using Robust Optimization (RO). We… 
Highly Cited
2009
Highly Cited
2009
Highly Cited
2009
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively… 
Highly Cited
2009
Highly Cited
2009
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (and possibly… 
Highly Cited
2007
Highly Cited
2007
Wireless sensor networks are often deployed in hostile environments, where anadversary can physically capture some of the nodes… 
Highly Cited
2005
Highly Cited
2005
We present a path perturbation algorithm which can maximize users’ location privacy given a quality of service constraint. This… 
Highly Cited
2004
Highly Cited
2004
As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become… 
Highly Cited
2000
Highly Cited
2000
We describe a system that we have designed and implemented for publishing content on the web. Our publishing scheme has the… 
Highly Cited
1994
Highly Cited
1994
We present practical conference key distribution systems based on public keys, which authenticate the users and which are ‘proven… 
Highly Cited
1990
Highly Cited
1990
Competitive analysis is concerned with comparing the performance of on-line algorithms with that of an optimal off-line algorithm…