Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cryptogram

Known as: Cryptoquip, Crypto-gram, Cryptoquote 
A cryptogram is a type of puzzle that consists of a short piece of encrypted text. Generally the cipher used to encrypt the text is simple enough… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Past few years, the mobile technology and location based services have experienced a great increment in number of its users. The… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
2013
2013
We study the problem of parameterized matching in a stream where we want to output matches between a pattern of length m and the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2010
2010
  • Abir Awad
  • IACR Cryptol. ePrint Arch.
  • 2010
  • Corpus ID: 9402634
ABSTRACT⎯ This paper presents a novel chaos-based cryptosystem for secure transmitted images. In the proposed block encryption… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Highly Cited
2005
Highly Cited
2005
One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with… Expand
  • table 1
Highly Cited
2001
Highly Cited
2001
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1997
Highly Cited
1997
Considers Shannon's cipher system with a memoryless broadcast channel. The source output sequence {S/sub l/}/sub t//sup /spl… Expand
  • figure 1
  • figure 2
Highly Cited
1994
Highly Cited
1994
Designers and users of encryption algorithms used in cipher systems need a systematic approach in examining their ciphers prior… Expand
  • figure I
  • figure 2
1985
1985
Will a single atom irradiated by coherent light be equivalent to an infinite computer as regards its ability to generate random… Expand
Highly Cited
1949
Highly Cited
1949
  • C. Shannon
  • Bell Syst. Tech. J.
  • 1949
  • Corpus ID: 3427690
THE problems of cryptography and secrecy systems furnish an interesting application of communication theory.1 In this paper a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5