Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,484 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext
Known as:
Cipher text
, Cyphertext
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Avalanche effect
Block cipher
Block cipher mode of operation
Block size (cryptography)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Various Schemes for Database Encryption - A Survey
P.R.Hariharan Dr
,
K. P. Thooyamani
2017
Corpus ID: 212562841
In this IT world, databases contain lot of confidential and sensitive details of different organizations all over the world…
Expand
2017
2017
Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain
J. Vilardy
,
M. S. Millán
,
E. Pérez-Cabré
2017
Corpus ID: 46028468
2015
2015
A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing
M. R. Baharon
,
Q. Shi
,
D. Llewellyn-Jones
IEEE International Conference on Computer and…
2015
Corpus ID: 16333304
The emerging technology of mobile devices allows mobile users to access a wide range of applications through the Internet…
Expand
Highly Cited
2013
Highly Cited
2013
Application of S-box and chaotic map for image encryption
I. Hussain
,
T. Shah
,
M. Gondal
Mathematical and computer modelling
2013
Corpus ID: 9682731
2010
2010
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
Kiran Kumar M
,
Mukthyar Azam S
,
S. Rasool
2010
Corpus ID: 16439438
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
2005
2005
Computational and information-theoretic soundness and completeness of formal encryption
P. Adão
,
G. Bana
,
A. Scedrov
18th IEEE Computer Security Foundations Workshop…
2005
Corpus ID: 7988177
We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic expressions. We expand the…
Expand
Highly Cited
2004
Highly Cited
2004
A smart card-based remote scheme for password authentication in multi-server Internet services
Woei-Jiunn Tsaur
,
Chia-Chun Wu
,
Wei-Bin Lee
Comput. Stand. Interfaces
2004
Corpus ID: 5067660
2003
2003
Flaws in Some Robust Optimistic Mix-Nets
Masayuki Abe
,
H. Imai
Australasian Conference on Information Security…
2003
Corpus ID: 2853427
This paper introduces weaknesses of two robust Mix-nets proposed in [10] and [7]. First, we show that [10] can lose anonymity in…
Expand
1994
1994
Intrinsic Statistical Weakness of Keystream Generators
J. Golic
International Conference on the Theory and…
1994
Corpus ID: 45545464
It is shown that an arbitrary binary keystream generator with M bits of memory can be linearly modelled as a non-autonomous…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE