Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,284,004 papers from all fields of science
Search
Sign In
Create Free Account
Cipher
Known as:
Encipherments
, Cipherable
, Decipherable
Expand
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
B-Dienst
Block size (cryptography)
Cipher Department of the High Command of the Wehrmacht
Code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
An optical neural interface : in vivo control of rodent motor cortex with integrated fiberoptic and optogenetic technology
Y. Cho
,
G. Zheng
,
+11 authors
Y. Hoshi
2016
Corpus ID: 85508090
Mechanistic understanding of how the brain gives rise to complex behavioral and cognitive functions is one of science’s grand…
Expand
2012
2012
Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems
Adnan Gutub
,
Farhan Khan
International Conference on Advanced Computer…
2012
Corpus ID: 18059869
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods…
Expand
2007
2007
Rijndael for Sensor Networks: Is Speed the Main Issue?
A. Vitaletti
,
Gianni Palombizio
WCAN@ICALP
2007
Corpus ID: 16950193
Highly Cited
2004
Highly Cited
2004
Commutative cipher based en-route filtering in wireless sensor networks
Hao Yang
,
Songwu Lu
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2573296
Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of…
Expand
Highly Cited
2003
Highly Cited
2003
Chaos synchronization of a horizontal platform system
Z. Ge
,
Tsung-Chih Yu
,
Yen-Sheng Chen
2003
Corpus ID: 58903561
1999
1999
Improved Analysis of Some Simplified Variants of RC6
S. Contini
,
R. Rivest
,
M. Robshaw
,
Y. Yin
Fast Software Encryption Workshop
1999
Corpus ID: 1414147
RC6 has been submitted as a candidate for the Advanced Encryption Standard (AES). Two important features of RC6 that were absent…
Expand
1997
1997
Secure Communication with Chaotic Systems of Difference Equations
S. Papadimitriou
,
Anastasios Bezerianos
,
T. Bountis
IEEE Trans. Computers
1997
Corpus ID: 10381497
The paper presents chaotic systems of difference equations that can effectively encrypt information. Two classes of systems are…
Expand
1994
1994
Intrinsic Statistical Weakness of Keystream Generators
J. Golic
International Conference on the Theory and…
1994
Corpus ID: 45545464
It is shown that an arbitrary binary keystream generator with M bits of memory can be linearly modelled as a non-autonomous…
Expand
Highly Cited
1992
Highly Cited
1992
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)
Yuliang Zheng
,
J. Seberry
Annual International Cryptology Conference
1992
Corpus ID: 12825077
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…
Expand
1991
1991
Image encipherment based on optical parallel processing using spatial light modulators
S. Fukushima
,
T. Kurokawa
,
Y. Sakai
IEEE Photonics Technology Letters
1991
Corpus ID: 13433078
All-optical image coding and decoding are demonstrated for image encipherment communication. The optical parallel coder consists…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE