Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 206,140,554 papers from all fields of science
Search
Sign In
Create Free Account
Centre for Applied Cryptographic Research
Known as:
CACR
, Center for Applied Cryptographic Research
The Centre for Applied Cryptographic Research (CACR) is a group of industrial representatives, professors, and students at the University of Waterloo…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
6 relations
Computer science
Cryptography
Elliptic curve cryptography
Hyperelliptic curve cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Context-aware Academic Collaborator Recommendation
Zheng Liu
,
Xing Xie
,
Lei Chen
KDD
2018
Corpus ID: 50771526
Collaborator Recommendation is a useful application in exploiting big academic data. However, existing works leave out the…
Expand
2018
2018
Gene mining-based identification of aldo–keto reductases for highly stereoselective reduction of bulky ketones
Chenchen Liang
,
Y. Nie
,
X. Mu
,
Yan Xu
Bioresources and Bioprocessing
2018
Corpus ID: 51804925
BackgroundAldo–keto reductase (AKR) or alcohol dehydrogenases (ADH)-mediated stereoselective reduction of prochiral carbonyl…
Expand
2016
2016
A Dynamic Transform Noise Resistant Uniform Local Binary Pattern (DTNR-ULBP) for Age Classification
Praveen Kumar
,
V. Krishna
2016
Corpus ID: 43203769
Local binary pattern (LBP) captures the local information of a texture effectively and thus plays a dominant role in many image…
Expand
2015
2015
The international global atmospheric chemistry (IGAC) project: Facilitating atmospheric chemistry research for 25 years
M. Melamed
,
P. Monks
,
A. Goldstein
,
M. Lawrence
,
J. Jennings
2015
Corpus ID: 130584461
2013
2013
Security Challenges in Smart-Grid Metering and Control Systems
Xinxin Fan
,
G. Gong
2013
Corpus ID: 32873125
The smart grid is a next-generation power system that is increasingly attracting the attention of government, industry, and…
Expand
Highly Cited
2011
Highly Cited
2011
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
D. Engels
,
Markku-Juhani O. Saarinen
,
P. Schweitzer
,
Eric M. Smith
RFIDSec
2011
Corpus ID: 35834570
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally…
Expand
Review
2005
Review
2005
Key distribution mechanisms for wireless sensor networks : a survey
S. Çamtepe
,
B. Yener
2005
Corpus ID: 13962444
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical…
Expand
2002
2002
Engineering an interoperable computational collaboratory on the Grid
Vijay Mann
,
M. Parashar
Concurr. Comput. Pract. Exp.
2002
Corpus ID: 1732828
The growth of the Internet and the advent of the computational Grid have made it possible to develop and deploy advanced…
Expand
Highly Cited
2001
Highly Cited
2001
A low viscosity wedge in subduction zones
M. Billen
,
M. Gurnis
2001
Corpus ID: 54990573
Highly Cited
1999
Highly Cited
1999
Generation of waves in Boussinesq models using a source function method
G. Wei
,
J. Kirby
,
A. Sinha
1999
Corpus ID: 18574841
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE