# Cryptography

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

Review

2017

Review

2017

- IACR Cryptology ePrint Archive
- 2017

Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of… (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- 2003

Want to get experience? Want to get any ideas to create new things in your life? Read modern cryptography theory and practice now… (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- Journal of Cryptology
- 2001

Two distinct, rigorous views of cryptography have developed over the years, in two mostly separate communities. One of the views… (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application

- 2001

This paper discusses some aspects of testing random and pseudorandom number generators. A Statistical Test Suite for Random and… (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- 2000

If you really want to be smarter, reading can be one of the lots ways to evoke and realize. Many people who like reading will… (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- IACR Cryptology ePrint Archive
- 2000

We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows… (More)

Is this relevant?

Highly Cited

1994

Highly Cited

1994

- 1994

ebooks and guide Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptography Protocols Algorithms And… (More)

Is this relevant?

Highly Cited

1991

Highly Cited

1991

- STOC
- 1991

The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, the… (More)

Is this relevant?

Highly Cited

1988

Highly Cited

1988

- STOC
- 1988

Suppose your netmail is being erratically censored by Captain Yossarian. Whenever you send a message, he censors each bit of the… (More)

Is this relevant?

Highly Cited

1976

Highly Cited

1976

- IEEE Trans. Information Theory
- 1976

Two kinds of contemporary developments in crypcommunications over an insecure channel order to use cryptogtography are examined… (More)

Is this relevant?