Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cipher

Known as: Encipherments, Cipherable, Decipherable 
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
  • C. Li
  • J. Inf. Secur. Appl.
  • 2019
  • Corpus ID: 85543340
Abstract This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Abstract In this paper, we propose a new loss-less symmetric image cipher based on the widely used substitution–diffusion… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein… Expand
Is this relevant?
Highly Cited
1993
Highly Cited
1993
We introduce a new method for cryptanalysis of DES cipher, which is essentially a known-plaintext attack. As a result, it is… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1992
Highly Cited
1992
  • Ueli Maurer
  • Journal of Cryptology
  • 1992
  • Corpus ID: 12079602
Shannon's pessimistic theorem, which states that a cipher can be perfect only when the entropy of the secret key is at least as… Expand
  • figure 3
Is this relevant?
Highly Cited
1992
Highly Cited
1992
We propose a new known plaintext attack of FEAL cipher. Our method differs from previous statistical ones in point of deriving… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
1985
Highly Cited
1985
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a… Expand
Is this relevant?
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
  • table I
Is this relevant?