Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,875 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext
Known as:
Cipher text
, Cyphertext
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Avalanche effect
Block cipher
Block cipher mode of operation
Block size (cryptography)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
S. Panda
,
Satyanarayana Gandi
,
Amarendra Kothalanka
2015
Corpus ID: 54641682
Secure and efficient data transmission is a critical issue for cluster-based wireless Sensor Networks (WSNs). In Cluster-based…
Expand
2013
2013
Information hiding based on DNA steganography
Zicheng Wang
,
Xiaohan Zhao
,
Hong Wang
,
Guangzhao Cui
IEEE 4th International Conference on Software…
2013
Corpus ID: 14681088
As a special cryptography, DNA steganography is safer than ordinal cryptography, only if the primer sequences are concealed from…
Expand
2012
2012
Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security
Ajit Singh
,
Aarti Nandal
,
Swati Malik
2012
Corpus ID: 18078714
In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this…
Expand
2011
2011
Secure Image Steganography Based on Randomized Sequence of Cipher Bits
S. Rao
,
B. Rao
,
Rukma Rekha
Eighth International Conference on Information…
2011
Corpus ID: 7499975
Steganography deals with hiding of data in images and steganalysis reveals the presence of data and also the data. In this paper…
Expand
2011
2011
The Implementation of FPGA-based RSA Public-key Algorithm and its Application in Mobile-phone SMS Encryption System
Na Qi
,
Jing Pan
,
Q. Ding
First International Conference on Instrumentation…
2011
Corpus ID: 10777911
Nowadays RSA password system has been the broadest used and the highest security of public-key cryptosystem, the RSA password and…
Expand
2010
2010
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
K. M
,
Mukthyar Azam S
,
S. Rasool
2010
Corpus ID: 16439438
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted…
Expand
2009
2009
Add-On Security Model for Public-Key Cryptosystem Based on Magic Square Implementation
G. Ganapathy
,
K. Mani
2009
Corpus ID: 17699603
The efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption and the way it produces…
Expand
2006
2006
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Eike Kiltz
IACR Cryptology ePrint Archive
2006
Corpus ID: 14294683
We describe a practical identity-based encryption scheme that is secure in the standard model againstchosen-ciphertext(IND-CCA2…
Expand
2006
2006
A Modified Version of the Vigenère Algorithm
P. I. Wilson
,
Mário A. P. Garcia
2006
Corpus ID: 8079854
†Summary Stream ciphers in general tend to be weak since they lack the benefit of diffusion. It is for this reason alone that the…
Expand
2005
2005
Partitioning QoS management for secure tactical wireless ad hoc networks
G. Elmasry
,
C. J. McCann
,
R. Welsh
IEEE Communications Magazine
2005
Corpus ID: 36408634
Addressing quality of service in military wireless ad hoc communication networks involves unique challenges due to imposed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE