Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,602,282 papers from all fields of science
Search
Sign In
Create Free Account
Cryptogram
Known as:
Cryptoquip
, Crypto-gram
, Cryptoquote
Expand
A cryptogram is a type of puzzle that consists of a short piece of encrypted text. Generally the cipher used to encrypt the text is simple enough…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
13 relations
American Cryptogram Association
Ciphertext
Crossword
Cryptography
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme
I. Memon
,
Ibrar Hussain
,
Rizwan Akhtar
,
Gencai Chen
Wirel. Pers. Commun.
2015
Corpus ID: 17321945
Past few years, the mobile technology and location based services have experienced a great increment in number of its users. The…
Expand
2013
2013
Parameterized Matching in the Streaming Model
Markus Jalsenius
,
Benny Porat
,
Benjamin Sach
STACS
2013
Corpus ID: 730367
We study the problem of parameterized matching in a stream where we want to output matches between a pattern of length m and the…
Expand
Highly Cited
2009
Highly Cited
2009
Image encryption by multiple random grids
S. Shyu
Pattern Recognit.
2009
Corpus ID: 8347666
Highly Cited
2005
Highly Cited
2005
Towards Acceptable Public-Key Encryption in Sensor Networks
Erik-Oliver Blass
,
M. Zitterbart
IWUC
2005
Corpus ID: 4688313
One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with…
Expand
Highly Cited
2001
Highly Cited
2001
Quantum Cryptography
N. Gisin
,
G. Ribordy
,
W. Tittel
,
H. Zbinden
2001
Corpus ID: 6979295
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical…
Expand
Highly Cited
1997
Highly Cited
1997
Rate-distortion theory for the Shannon cipher system
Hirosuke Yamamoto
IEEE Trans. Inf. Theory
1997
Corpus ID: 5451293
Considers Shannon's cipher system with a memoryless broadcast channel. The source output sequence {S/sub l/}/sub t//sup /spl…
Expand
Highly Cited
1994
Highly Cited
1994
A computer package for measuring the strength of encryption algorithms
Helen Gustafson
,
E. Dawson
,
Lauren Nielsen
,
W. Caelli
Comput. Secur.
1994
Corpus ID: 35898116
1985
1985
Randomness in quantum mechanics—nature's ultimate cryptogram?
T. Erber
,
S. Putterman
Nature
1985
Corpus ID: 4288433
Will a single atom irradiated by coherent light be equivalent to an infinite computer as regards its ability to generate random…
Expand
1975
1975
Manichaean literature : representative texts chiefly from Middle Persian and Parthian writings
J. Asmussen
1975
Corpus ID: 160699969
Highly Cited
1949
Highly Cited
1949
Communication theory of secrecy systems
C. Shannon
Bell Syst. Tech. J.
1949
Corpus ID: 3427690
THE problems of cryptography and secrecy systems furnish an interesting application of communication theory.1 In this paper a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE