Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cryptography

Known as: Cyptography, Crypto, Mathematical cryptography 
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security… Expand
Review
1998
Review
1998
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and… Expand
Highly Cited
1997
Highly Cited
1997
The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer… Expand
  • figure 1
  • figure 2
Highly Cited
1996
Highly Cited
1996
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the… Expand
  • table 1
  • figure 1
  • table 2
  • table 1.1
  • figure 1.1
Highly Cited
1995
Highly Cited
1995
  • D. Stinson
  • Discrete mathematics and its applications series
  • 1995
  • Corpus ID: 43031233
From the Publisher: The object of the book is to produce a general, comprehensive textbook that treats all the essential core… Expand
Highly Cited
1994
Highly Cited
1994
ebooks and guide Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptography Protocols Algorithms And… Expand
Highly Cited
1991
Highly Cited
1991
The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, the… Expand
  • figure 1
Highly Cited
1985
Highly Cited
1985
We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange… Expand
Highly Cited
1982
Highly Cited
1982
From the Preface (See Front Matter for full Preface) Electronic computers have evolved from exiguous experimental enterprises… Expand
Highly Cited
1976
Highly Cited
1976
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a… Expand
  • figure 2
  • figure 3