Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cryptography

Known as: Cyptography, Crypto, Mathematical cryptography 
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Blockchain offers an innovative approach to storing information, executing transactions, performing functions, and establishing… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Review
2019
Review
2019
Industrial Internet of Things (IIoT) is revolutionizing the retail industry for manufacturers, suppliers, and retailers to… Expand
  • figure 1
  • table I
  • figure 2
  • table III
  • figure 3
Is this relevant?
Review
2019
Review
2019
Internet of things (IoT) is realized by the idea of free flow of information amongst various low-power embedded devices that use… Expand
  • table 1
Is this relevant?
Review
2019
Review
2019
Recently, researchers found that the intended generalizability of (deep) face recognition systems increases their vulnerability… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2019
Review
2019
Abstract Blockchain, as a decentralized and distributed public ledger technology in peer-to-peer network, has received… Expand
Is this relevant?
Review
2018
Review
2018
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s to a tool for building real systems… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the… Expand
  • table 1
  • figure 1
  • table 2
  • table 1.1
  • figure 1.1
Is this relevant?
Highly Cited
1995
Highly Cited
1995
  • D. Stinson
  • Discrete mathematics and its applications series
  • 1995
  • Corpus ID: 43031233
From the Publisher: The object of the book is to produce a general, comprehensive textbook that treats all the essential core… Expand
Is this relevant?
Highly Cited
1985
Highly Cited
1985
We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange… Expand
Is this relevant?
Highly Cited
1976
Highly Cited
1976
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a… Expand
  • figure 2
  • figure 3
Is this relevant?