Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,245,973 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext
Known as:
Cipher text
, Cyphertext
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Avalanche effect
Block cipher
Block cipher mode of operation
Block size (cryptography)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model
Jinqiu Hou
,
Mingming Jiang
,
Yuyan Guo
,
Wangan Song
Journal of Information Security and Applications
2019
Corpus ID: 125796352
2017
2017
Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain
J. Vilardy
,
M. S. Millán
,
E. Pérez-Cabré
2017
Corpus ID: 46028468
2014
2014
Secure authentication and integrity techniques for randomized secured routing in WSN
U. S. kumaran
,
Ilango Paramasivam
Wireless networks
2014
Corpus ID: 29882420
As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these…
Expand
Highly Cited
2013
Highly Cited
2013
Application of S-box and chaotic map for image encryption
I. Hussain
,
T. Shah
,
M. Gondal
Mathematical and computer modelling
2013
Corpus ID: 9682731
2012
2012
CCA-secure Anonymous Multi-receiver ID-based Encryption
Yuh-Min Tseng
,
Yi-Hung Huang
,
Hui-Ju Chang
26th International Conference on Advanced…
2012
Corpus ID: 10614576
Recently, Fan et al. proposed the first anonymous multi-receiver identity (ID)-based encryption (AMIBE) scheme to encrypt a…
Expand
2010
2010
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
Kiran Kumar M
,
Mukthyar Azam S
,
S. Rasool
2010
Corpus ID: 16439438
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
Highly Cited
2004
Highly Cited
2004
A smart card-based remote scheme for password authentication in multi-server Internet services
Woei-Jiunn Tsaur
,
Chia-Chun Wu
,
Wei-Bin Lee
Comput. Stand. Interfaces
2004
Corpus ID: 5067660
2003
2003
A procedure for verifying security against type confusion attacks
C. Meadows
16th IEEE Computer Security Foundations Workshop…
2003
Corpus ID: 6628352
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by…
Expand
1994
1994
Intrinsic Statistical Weakness of Keystream Generators
J. Golic
International Conference on the Theory and…
1994
Corpus ID: 45545464
It is shown that an arbitrary binary keystream generator with M bits of memory can be linearly modelled as a non-autonomous…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE