Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cryptographic nonce

Known as: Nonce, Nonce (cryptography) 
In cryptography, a nonce is an arbitrary number that may only be used once. It is similar in spirit to a nonce word, hence the name. It is often a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
We introduce the key reinstallation attack. This attack abuses design or implementation flaws in cryptographic protocols to… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In recent years, Session Initiation Protocol (SIP) is more and more popular. However, there are many security problems in the… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Phonological judgements are often gradient: blick >? bwick >* bnick >** bzick . The mechanisms behind gradient generalisation… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This chapter is about how young children master the use of a language, with a focus on grammatical constructions. Major theories… Expand
  • table 1
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent… Expand
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Abstract. We present a polynomial-time algorithm that provably recovers the signer's secret DSA key when a few consecutive bits… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The representation of regular morphological processes has been the subject of much controversy, particularly in the debate… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We investigate the following approach to symmetric encryption: first encode the message via some keyless transform, and then… Expand
  • figure 1
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Abstract Three paper-and-pencil measures were administered to students in fourth, sixth, and eighth grades to assess different… Expand
  • table 1
  • table 2
  • table 3
  • table 8
  • table 9
Is this relevant?
Highly Cited
1988
Highly Cited
1988
This paper represents a comprehensive study of English loanword usage in five diverse francophone neighborhoods in the national… Expand
  • figure 1
  • table I
  • table 2
  • figure 2
  • figure 3
Is this relevant?