Skip to search formSkip to main contentSkip to account menu

Cipher

Known as: Encipherments, Cipherable, Decipherable 
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Mechanistic understanding of how the brain gives rise to complex behavioral and cognitive functions is one of science’s grand… 
Highly Cited
2013
Highly Cited
2013
For wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique… 
2012
2012
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods… 
Highly Cited
2011
Highly Cited
2011
Image encryption is a suitable method to protect image data. Image and text data has their unique features. The available… 
2011
2011
Because of high sensitivity for initial values and random-like behaviors, chaotic systems are widely used in image encryption… 
Highly Cited
2003
Highly Cited
2001
Highly Cited
2001
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic… 
Highly Cited
1995
Highly Cited
1995
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the… 
Highly Cited
1992
Highly Cited
1992
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…