Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,367,685 papers from all fields of science
Search
Sign In
Create Free Account
Cipher
Known as:
Encipherments
, Cipherable
, Decipherable
Expand
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
B-Dienst
Block size (cryptography)
Cipher Department of the High Command of the Wehrmacht
Code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Video signal level (colour intensity) and effectiveness of electromagnetic infiltration
I. Kubiak
2016
Corpus ID: 123475168
Nowadays, when we have a strong presence of computers in our everyday lives the protection of electronically processed…
Expand
2015
2015
Improved Signcryption Algorithm for Information Security in Networks
R. Nishanth
2015
Corpus ID: 14061307
In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out…
Expand
2011
2011
Novel and Efficient Cellular Automata Based Symmetric Key Encryption Algorithm for Wireless Sensor Networks
K. J. J. Kumar
,
Kalavakkam-603110 Chennai
,
K. Chenna
,
K. Reddy
,
S. Salivahanan
2011
Corpus ID: 7909096
Our proposed method L2D-CASKE, the lightweight 2-dimensional (2-D) Cellular Automata (CA) based symmetric key encryption…
Expand
2010
2010
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
K. M
,
Mukthyar Azam S
,
S. Rasool
2010
Corpus ID: 16439438
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted…
Expand
Review
2008
Review
2008
Feminist Performance Criticism and the Popular: Reviewing Wendy Wasserstein
Jill Dolan
2008
Corpus ID: 143897063
This essay suggests that the taxonomy of feminisms—liberal, cultural, and materialist—while usefully lending precision to our…
Expand
1999
1999
A method for evaluating basement exhumation histories from closure age distributions of detrital minerals
O. Lovera
,
M. Grove
,
D. Kimbrough
,
P. Abbott
1999
Corpus ID: 15650198
We have developed a two-dimensional, thermokinetic model that predicts the closure age distributions of detrital minerals from…
Expand
1997
1997
Secure Communication with Chaotic Systems of Difference Equations
S. Papadimitriou
,
Anastasios Bezerianos
,
T. Bountis
IEEE Trans. Computers
1997
Corpus ID: 10381497
The paper presents chaotic systems of difference equations that can effectively encrypt information. Two classes of systems are…
Expand
1995
1995
Deciding multiset decipherability
T. Head
,
M. Weber
IEEE Transactions on Information Theory
1995
Corpus ID: 7728420
An O(n/sup 2/L) time and O((n+k)L) space algorithm is provided for deciding whether or not a finite set C consisting of n words…
Expand
1991
1991
Enamel thickness in South African australopithecines: noninvasive evaluation by computed tomography
G. Conroy
1991
Corpus ID: 55489565
Until recently, it has not been possible to systematically study enamel thickness in fossil hominids except by physically…
Expand
1979
1979
Early Work on Computers at Bletchley
I. Good
Annals of the History of Computing
1979
Corpus ID: 22670337
Pioneering work on computers was carried out at Bletchley, England, during World War II, for the cryptanalysis of the messages…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE