Adversary

In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1954-2017
0500100019542016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this paper, we construct efficient secure protocols for set intersection and pattern matching. Our protocols for secure… (More)
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a… (More)
  • figure 1
  • table I
  • table II
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
A security metric measures or assesses the extent to which a system meets its security objectives. Since meaningful quantitative… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The DARPA Information Assurance Program did initial research in the area of dynamic network defense, trying to prove that dynamic… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We consider veriiable secret sharing (VSS) and multiparty computation (MPC) in the secure-channels model, where a broadcast… (More)
Is this relevant?