Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,798,538 papers from all fields of science
Search
Sign In
Create Free Account
Cipher
Known as:
Encipherments
, Cipherable
, Decipherable
Expand
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
B-Dienst
Block size (cryptography)
Cipher Department of the High Command of the Wehrmacht
Code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2006
Highly Cited
2006
Image encryption using chaotic logistic map
N. K. Pareek
,
Vinod Patidar
,
K. Sud
Image and Vision Computing
2006
Corpus ID: 833601
Highly Cited
2003
Highly Cited
2003
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
G. Álvarez
,
Shujun Li
International Journal of Bifurcation and Chaos in…
2003
Corpus ID: 314070
In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes…
Expand
Highly Cited
1998
Highly Cited
1998
Side Channel Cryptanalysis of Product Ciphers
J. Kelsey
,
B. Schneier
,
D. Wagner
,
Chris Hall
Journal of computing and security
1998
Corpus ID: 16489453
Building on the work of Kocher [Koc96], we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation…
Expand
Highly Cited
1997
Highly Cited
1997
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
D. Boneh
,
R. DeMillo
,
R. Lipton
International Conference on the Theory and…
1997
Corpus ID: 18070802
A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein…
Expand
Highly Cited
1995
Highly Cited
1995
Cipher and hash function design strategies based on linear and differential cryptanalysis
J. Daemen
1995
Corpus ID: 59642110
This thesis contains a new approach to design block ciphers, synchronous and self-synchronizing stream ciphers and cryptographic…
Expand
Highly Cited
1994
Highly Cited
1994
Linear Cryptanalysis Method for DES Cipher
M. Matsui
International Conference on the Theory and…
1994
Corpus ID: 533517
We introduce a new method for cryptanalysis of DES cipher, which is essentially a known-plaintext attack. As a result, it is…
Expand
Highly Cited
1992
Highly Cited
1992
Conditionally-perfect secrecy and a provably-secure randomized cipher
U. Maurer
Journal of Cryptology
1992
Corpus ID: 12079602
Shannon's pessimistic theorem, which states that a cipher can be perfect only when the entropy of the secret key is at least as…
Expand
Highly Cited
1992
Highly Cited
1992
A New Method for Known Plaintext Attack of FEAL Cipher
M. Matsui
,
A. Yamagishi
International Conference on the Theory and…
1992
Corpus ID: 33383014
We propose a new known plaintext attack of FEAL cipher. Our method differs from previous statistical ones in point of deriving…
Expand
Highly Cited
1984
Highly Cited
1984
A public key cryptosystem and a signature scheme based on discrete logarithms
Taher El Gamal
IEEE Transactions on Information Theory
1984
Corpus ID: 2973271
The invention pertains to a novel method of forming a flexible, tapered end on a thermoplastic molding strip. The strip is of the…
Expand
Highly Cited
1978
Highly Cited
1978
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest
,
A. Shamir
,
L. Adleman
CACM
1978
Corpus ID: 30798417
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE