Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,274,658 papers from all fields of science
Search
Sign In
Create Free Account
Cryptography
Known as:
Cyptography
, Crypto
, Mathematical cryptography
Expand
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Backup
Block cipher mode of operation
CDMF
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Handbook of Applied Cryptography
A. Menezes
,
P. V. Oorschot
,
S. Vanstone
2018
Corpus ID: 13601326
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the…
Expand
Highly Cited
2018
Highly Cited
2018
Understanding Cryptography
C. Paar
,
J. Pelzl
Springer Berlin Heidelberg
2018
Corpus ID: 60473354
1 What the book is about Yet another introductory book on cryptography!? This is what most people from the community might think…
Expand
Highly Cited
2003
Highly Cited
2003
Modern Cryptography: Theory and Practice
W. Mao
2003
Corpus ID: 61070791
Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook…
Expand
Review
2001
Review
2001
Chaos-based cryptography: a brief overview
L. Kocarev
2001
Corpus ID: 9175918
Over the past decade, there has been tremendous interest in studying the behavior of chaotic systems. They are characterized by…
Expand
Highly Cited
2000
Highly Cited
2000
Introduction to Modern Cryptography
Luca Trevisan
2000
Corpus ID: 9506320
Here, int() changes binary string (bytes) into integer and bin() changes integer to bytes string (binary). The message space is…
Expand
Highly Cited
1994
Highly Cited
1994
Differentially Uniform Mappings for Cryptography
K. Nyberg
International Conference on the Theory and…
1994
Corpus ID: 7416152
This work is motivated by the observation that in DES-like ciphers it is possible to choose the round functions in such a way…
Expand
Highly Cited
1991
Highly Cited
1991
Non-malleable cryptography
D. Dolev
,
C. Dwork
,
M. Naor
Symposium on the Theory of Computing
1991
Corpus ID: 14093114
The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, the…
Expand
Highly Cited
1985
Highly Cited
1985
Use of Elliptic Curves in Cryptography
V. Miller
Annual International Cryptology Conference
1985
Corpus ID: 206617984
We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange…
Expand
Highly Cited
1982
Highly Cited
1982
Cryptography and Data Security
D. Denning
1982
Corpus ID: 5116131
From the Preface (See Front Matter for full Preface) Electronic computers have evolved from exiguous experimental enterprises…
Expand
Highly Cited
1976
Highly Cited
1976
New Directions in Cryptography
W. Diffie
,
M. Hellman
IEEE Transactions on Information Theory
1976
Corpus ID: 275548
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required