Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,351,161 papers from all fields of science
Search
Sign In
Create Free Account
Cryptogram
Known as:
Cryptoquip
, Crypto-gram
, Cryptoquote
Expand
A cryptogram is a type of puzzle that consists of a short piece of encrypted text. Generally the cipher used to encrypt the text is simple enough…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
American Cryptogram Association
Ciphertext
Crossword
Cryptography
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Halftone visual cryptography for color images
Shivani Pahuja
,
Singara Singh Kasana
International Conference on Computer…
2017
Corpus ID: 40119401
Visual cryptographic schemes (VCS) allow one(at the sender side) to encrypt a secret picture (image) into different share images…
Expand
Review
2014
Review
2014
A critical review of the EMV payment tokenisation specification
Diego A. Ortiz-Yepes
2014
Corpus ID: 62603280
2014
2014
Security of a sessional blind signature based on quantum cryptograph
Tianyin Wang
,
Xiao-Qiu Cai
,
Rui-Ling Zhang
Quantum Information Processing
2014
Corpus ID: 35539911
We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security…
Expand
2010
2010
An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography
Zuowen Tan
J. Convergence Inf. Technol.
2010
Corpus ID: 16248311
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session…
Expand
2008
2008
Security Analysis and Authentication Improvement for IEEE 802.11i Specification
Xinyu Xing
,
E. Shakshuki
,
D. Benoit
,
T. Sheltami
IEEE GLOBECOM - IEEE Global Telecommunications…
2008
Corpus ID: 11454190
The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount…
Expand
2004
2004
Visual Cryptography for Digital Watermarking in Still Images
G. Tai
,
Long-Wen Chang
Pacific Rim Conference on Multimedia
2004
Corpus ID: 30229956
Visual cryptograph can represent the secret image by several different shares of binary images. It is hard to perceive any clues…
Expand
2004
2004
Stream cipher based on quasigroup string transformations in Zp*
D. Gligoroski
arXiv.org
2004
Corpus ID: 846070
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a…
Expand
1994
1994
Quantum Cryptography with Interferometric Quantum Entanglement
A. Ekert
,
G. Palma
1994
Corpus ID: 14706324
Abstract We provide a theoretical analysis of a quantum interferometric method in quantum cryptography based on the non-local…
Expand
1981
1981
Statistical Analysis of the Hagelin Cryptograph
R. Rivest
Cryptologia
1981
Corpus ID: 46306895
This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction…
Expand
1975
1975
Manichaean literature : representative texts chiefly from Middle Persian and Parthian writings
J. Asmussen
1975
Corpus ID: 160699969
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE