Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Code (cryptography)

Known as: Two-part code, Code (disambiguation), Codetext 
In cryptology, a code is a method used to encrypt a message that operates at the level of meaning; that is, words or phrases are converted into… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Abstract Class-imbalance learning is one of the most challenging problems in machine learning. As a new and important direction… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Introduction A fundamental objective of cryptography is to enable two persons to communicate over an insecure channel (a public… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Consider a setting where a large file is disseminated to a wide audience who may want to access it at various times and have… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
  • M. Luby
  • The 43rd Annual IEEE Symposium on Foundations of…
  • 2002
  • Corpus ID: 1861068
We introduce LT codes, the first rateless erasure codes that are very efficient as the data length grows. 
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Recently, researchers have demonstrated that "loopy belief propagation" -- the use of Pearl's polytree algorithm in a Bayesian… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The Search for the Codable Moment A Way of Seeing Developing Themes and Codes Deciding on Units of Analysis and Units of Coding… Expand
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Certain notorious nonlinear binary codes contain more codewords than any known linear code. These include the codes constructed… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1986
Highly Cited
1986
algorithmics and modular computations, Theory of Codes and Cryptography (3).From an analytical 1. RE Blahut. Theory and practice… Expand
Is this relevant?
Highly Cited
1983
Highly Cited
1983
To understand the theoretical framework upon which error-control codes are built and then Algebraic Codes for Data Transmission… Expand
Is this relevant?
Highly Cited
1982
Highly Cited
1982
A coding technique is described which improves error performance of synchronous data links without sacrificing data rate or… Expand
Is this relevant?