Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Adversary (cryptography)

Known as: Adversary 
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
In recent years, artificial intelligence technologies have been widely used in computer vision, natural language processing… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Review
2019
Review
2019
In recent years, the rapid development of cryptocurrencies and their underlying blockchain technology has revived Szabo’s… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Review
2019
Review
2019
Deep learning achieves state-of-the-art results in many areas. However recent works have shown that deep networks can be… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Review
2019
Review
2019
Correctly evaluating defenses against adversarial examples has proven to be extremely difficult. Despite the significant amount… Expand
Review
2018
Review
2018
We introduce a new model of stochastic bandits with adversarial corruptions which aims to capture settings where most of the… Expand
  • figure 1
Review
2018
Review
2018
Although various techniques have been proposed to generate adversarial samples for white-box attacks on text, little attention… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Review
2018
Review
2018
The growth in the number of devices connected to the Internet of Things (IoT) poses major challenges in security. The integrity… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Review
2018
Review
2018
Secure device pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Review
2017
Review
2017
Even todays most advanced machine learning models are easily fooled by almost imperceptible perturbations of their inputs… Expand
Review
2017
Review
2017
The threat of hardware reverse engineering is a growing concern for a large number of applications. A main defense strategy… Expand
  • table I
  • figure 1
  • figure 2
  • figure 5
  • figure 3