Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,861,050 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext
Known as:
Cipher text
, Cyphertext
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Avalanche effect
Block cipher
Block cipher mode of operation
Block size (cryptography)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
S. Panda
,
Satyanarayana Gandi
,
Amarendra Kothalanka
2015
Corpus ID: 54641682
Secure and efficient data transmission is a critical issue for cluster-based wireless Sensor Networks (WSNs). In Cluster-based…
Expand
2014
2014
Secure authentication and integrity techniques for randomized secured routing in WSN
U. S. kumaran
,
Ilango Paramasivam
Wireless networks
2014
Corpus ID: 29882420
As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these…
Expand
2012
2012
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds
Qin Liu
,
Guojun Wang
,
Jie Wu
41st International Conference on Parallel…
2012
Corpus ID: 15188240
In this paper, we propose a clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable…
Expand
2012
2012
Image encryption using random pixel permutation by chaotic mapping
G. Sathishkumar
,
S. Ramachandran
,
K. Bhoopathy Bagan
International Conference on Smart City and…
2012
Corpus ID: 14754285
With the fast evolution of digital data exchange, security of information becomes much important in data storage and transmission…
Expand
2011
2011
Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm
Trisha Chatterjee
,
Tamodeep Das
,
Shayan Dey
,
A. Nath
,
J. Nath
World Congress on Information and Communication…
2011
Corpus ID: 32131675
In the present paper the authors have introduced a new combined cryptographic method called TTJSA. Nath et al. have already…
Expand
2010
2010
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
Kiran Kumar M
,
Mukthyar Azam S
,
S. Rasool
2010
Corpus ID: 16439438
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
2006
2006
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Eike Kiltz
IACR Cryptology ePrint Archive
2006
Corpus ID: 14294683
We describe a practical identity-based encryption scheme that is secure in the standard model againstchosen-ciphertext(IND-CCA2…
Expand
2003
2003
A procedure for verifying security against type confusion attacks
C. Meadows
16th IEEE Computer Security Foundations Workshop…
2003
Corpus ID: 6628352
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by…
Expand
1994
1994
Intrinsic Statistical Weakness of Keystream Generators
J. Golic
International Conference on the Theory and…
1994
Corpus ID: 45545464
It is shown that an arbitrary binary keystream generator with M bits of memory can be linearly modelled as a non-autonomous…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE