Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Cipher
Known as:
Encipherments
, Cipherable
, Decipherable
Expand
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
B-Dienst
Block size (cryptography)
Cipher Department of the High Command of the Wehrmacht
Code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
An optical neural interface : in vivo control of rodent motor cortex with integrated fiberoptic and optogenetic technology
Y. Cho
,
G. Zheng
,
+11 authors
Y. Hoshi
2016
Corpus ID: 85508090
Mechanistic understanding of how the brain gives rise to complex behavioral and cognitive functions is one of science’s grand…
Expand
Highly Cited
2013
Highly Cited
2013
Application of S-box and chaotic map for image encryption
I. Hussain
,
T. Shah
,
M. Gondal
Mathematical and computer modelling
2013
Corpus ID: 9682731
2012
2012
Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems
Adnan Gutub
,
Farhan Khan
International Conference on Advanced Computer…
2012
Corpus ID: 18059869
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods…
Expand
2011
2011
A wheel-switch chaotic system for image encryption
Yue Wu
,
J. Noonan
,
S. Agaian
Proceedings International Conference on System…
2011
Corpus ID: 12649466
Because of high sensitivity for initial values and random-like behaviors, chaotic systems are widely used in image encryption…
Expand
2011
2011
Multi-level attacks: An emerging security concern for cryptographic hardware
Subidh Ali
,
R. Chakraborty
,
Debdeep Mukhopadhyay
,
S. Bhunia
Design, Automation and Test in Europe
2011
Corpus ID: 14771730
Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as…
Expand
Highly Cited
2003
Highly Cited
2003
Chaos synchronization of a horizontal platform system
Z. Ge
,
Tsung-Chih Yu
,
Yen-Sheng Chen
2003
Corpus ID: 58903561
Highly Cited
2001
Highly Cited
2001
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board
Pawel Chodowiec
,
K. Gaj
,
P. Bellows
,
Brian Schott
Information Security Conference
2001
Corpus ID: 7768736
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic…
Expand
1999
1999
Improved Analysis of Some Simplified Variants of RC6
S. Contini
,
R. Rivest
,
M. Robshaw
,
Y. Yin
Fast Software Encryption Workshop
1999
Corpus ID: 1414147
RC6 has been submitted as a candidate for the Advanced Encryption Standard (AES). Two important features of RC6 that were absent…
Expand
Highly Cited
1995
Highly Cited
1995
Authentication protocols for personal communication systems
Hung-Yu Lin
,
L. Harn
Conference on Applications, Technologies…
1995
Corpus ID: 8273506
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the…
Expand
Highly Cited
1992
Highly Cited
1992
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)
Yuliang Zheng
,
J. Seberry
Annual International Cryptology Conference
1992
Corpus ID: 12825077
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE