Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,098,314 papers from all fields of science
Search
Sign In
Create Free Account
Cipher
Known as:
Encipherments
, Cipherable
, Decipherable
Expand
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
B-Dienst
Block size (cryptography)
Cipher Department of the High Command of the Wehrmacht
Code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
An optical neural interface : in vivo control of rodent motor cortex with integrated fiberoptic and optogenetic technology
Y. Cho
,
G. Zheng
,
+11 authors
Y. Hoshi
2016
Corpus ID: 85508090
Mechanistic understanding of how the brain gives rise to complex behavioral and cognitive functions is one of science’s grand…
Expand
Highly Cited
2013
Highly Cited
2013
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks
Yue-Hsun Lin
,
Shih-Ying Chang
,
Hung-Min Sun
IEEE Transactions on Knowledge and Data…
2013
Corpus ID: 7202952
For wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique…
Expand
Highly Cited
2013
Highly Cited
2013
Application of S-box and chaotic map for image encryption
I. Hussain
,
T. Shah
,
M. Gondal
Mathematical and computer modelling
2013
Corpus ID: 9682731
2012
2012
Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems
Adnan Gutub
,
Farhan Khan
International Conference on Advanced Computer…
2012
Corpus ID: 18059869
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods…
Expand
Highly Cited
2011
Highly Cited
2011
Image encryption using affine transform and XOR operation
A. Nag
,
J. Singh
,
+4 authors
P. Sarkar
International Conference on Signal Processing…
2011
Corpus ID: 14002413
Image encryption is a suitable method to protect image data. Image and text data has their unique features. The available…
Expand
2011
2011
A wheel-switch chaotic system for image encryption
Yue Wu
,
J. Noonan
,
S. Agaian
Proceedings International Conference on System…
2011
Corpus ID: 12649466
Because of high sensitivity for initial values and random-like behaviors, chaotic systems are widely used in image encryption…
Expand
Highly Cited
2003
Highly Cited
2003
Chaos synchronization of a horizontal platform system
Z. Ge
,
Tsung-Chih Yu
,
Yen-Sheng Chen
2003
Corpus ID: 58903561
Highly Cited
2001
Highly Cited
2001
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board
Pawel Chodowiec
,
K. Gaj
,
P. Bellows
,
Brian Schott
Information Security Conference
2001
Corpus ID: 7768736
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic…
Expand
Highly Cited
1995
Highly Cited
1995
Authentication protocols for personal communication systems
Hung-Yu Lin
,
L. Harn
Conference on Applications, Technologies…
1995
Corpus ID: 8273506
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the…
Expand
Highly Cited
1992
Highly Cited
1992
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)
Yuliang Zheng
,
J. Seberry
Annual International Cryptology Conference
1992
Corpus ID: 12825077
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE