Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cipher

Known as: Encipherments, Cipherable, Decipherable 
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
  • U. Maurer
  • Journal of Cryptology
  • 2004
  • Corpus ID: 12079602
Shannon's pessimistic theorem, which states that a cipher can be perfect only when the entropy of the secret key is at least as… Expand
  • figure 3
Highly Cited
1998
Highly Cited
1998
Contents Preface to the Revised Edition Preface to the First Edition. 1 Introduction. 2 Stream Ciphers. 3 Primes, Primitive Roots… Expand
Highly Cited
1997
Highly Cited
1997
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits… Expand
  • figure 1
  • figure 2
Highly Cited
1997
Highly Cited
1997
A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein… Expand
Highly Cited
1995
Highly Cited
1995
This thesis contains a new approach to design block ciphers, synchronous and self-synchronizing stream ciphers and cryptographic… Expand
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • figure 2.5
Highly Cited
1993
Highly Cited
1993
We introduce a new method for cryptanalysis of DES cipher, which is essentially a known-plaintext attack. As a result, it is… Expand
  • table 1
  • table 2
  • table 3
Highly Cited
1992
Highly Cited
1992
We propose a new known plaintext attack of FEAL cipher. Our method differs from previous statistical ones in point of deriving… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Highly Cited
1985
Highly Cited
1985
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a… Expand
Highly Cited
1983
Highly Cited
1983
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
  • table I