Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,864 papers from all fields of science
Search
Sign In
Create Free Account
Confusion and diffusion
Known as:
Diffusion (cryptography)
, Confusion (cryptography)
, Diffusion and confusion
Expand
In cryptography, confusion and diffusion are two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Algorithmic information theory
Avalanche effect
Bent function
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Reed canopy transparency under different levels of diffuse radiation
K. Harenda
,
M. Piatyszek
,
B. Chojnicki
2015
Corpus ID: 96454508
A b s t r a c t : Diffused solar radiation increases ecosystem productivity. One of the explanations for this phenomenon is the…
Expand
Review
2014
Review
2014
Brown Stock Washing – A Review of the Literature, 2014 PEERS Conference
Ricardo B. Santos
,
P. Hart
2014
Corpus ID: 121177687
Brown stock washing is a complex, dynamic process which separates dirty wash water or weak black liquor (dissolved organic and…
Expand
2013
2013
A Selective Image Encryption Based on Chaos Algorithm
A. M. Yousif
,
M. M. Ali
2013
Corpus ID: 11498265
Selective encryption is a new trend in image and video content protection. It's aim to reduce the amount of data to protect while…
Expand
2012
2012
IMAGE ENCRYPTION USING PERMUTATION AND ROTATIONAL XOR TECHNIQUE
A. Dixit
,
Pratik Dhruve
,
D. Bhagwan
2012
Corpus ID: 941620
Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different…
Expand
2012
2012
Hirarchical Digital Image Inpainting Using Wavelets
S. Padmavathi
,
B. Priyalakshmi
,
K. P. Soman
arXiv.org
2012
Corpus ID: 7636498
Inpainting is the technique of reconstructing unknown or damaged portions of an image in a visually plausible way. Inpainting…
Expand
2011
2011
Analysis and Implementation of a Fast Hash Function Based upon Elliptic Curves
M. Nouri
,
S. A. Aghdam
,
Mostafa Nourzadeh
,
M. Hatami
,
S. A. Aghdam
2011
Corpus ID: 11363348
Hash functions are probably the most popular component employed in cryptographic applications for their well known advantages…
Expand
2009
2009
An analysis of information technology adoption situation in Botswana secondary schools and its impact on digital scholarship initiatives in institutions of learning
Dr. Angelina Totolo
2009
Corpus ID: 19244994
Sub Saharan Africa is both technologically and economically less developed, and this has led to the slow adoption of information…
Expand
2008
2008
Rapid Electrochemical Assay of Glucose Oxidase Activity within Electrophoresis Gels
K. Fenton
,
C. Apblett
,
P. Atanassov
2008
Corpus ID: 90488288
In the course of biofuel cell development a particular effort is being placed in protein engineering of enzymes to enhance their…
Expand
2000
2000
INDEX OF BOOK TITLES
A. Knysh
2000
Corpus ID: 151814821
Fa ā il Yazīd, 296n. 81 Fawā i al-jalāl, 152n. 39, 156n. 45, 161n. 57 Fay al al-tafriqa, 264n. 20, 267n. 24, 294n. 74, 300n. 89…
Expand
1967
1967
DEVELOPMENT, DIFFUSION, AND EVALUATION.
E. Guba
1967
Corpus ID: 151010641
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required