Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,232,307 papers from all fields of science
Search
Sign In
Create Free Account
Cryptography
Known as:
Cyptography
, Crypto
, Mathematical cryptography
Expand
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Backup
Block cipher mode of operation
CDMF
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Cognitive Keys in Personalized Cryptography
M. Ogiela
,
L. Ogiela
International Conference on Advanced Information…
2017
Corpus ID: 13099707
In this paper will be described a new way of using cognitive approaches in personalized cryptography algorithms. Personal…
Expand
Highly Cited
2016
Highly Cited
2016
One-to-many authentication for access control in mobile pay-TV systems
De-biao He
,
Neeraj Kumar
,
Han Shen
,
Jong‐Hyouk Lee
Science China Information Sciences
2016
Corpus ID: 14725824
In traditional authentication schemes for access control in mobile pay-TV systems, one-to-one delivery is used, i.e., one…
Expand
Highly Cited
2014
Highly Cited
2014
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
J. Coron
,
Tancrède Lepoint
,
Mehdi Tibouchi
IACR Cryptology ePrint Archive
2014
Corpus ID: 15953676
Shortly following Cheon, Han, Lee, Ryu and Stehl e's attack against the multilinear map of Coron, Lepoint and Tibouchi (CLT), two…
Expand
Highly Cited
2008
Highly Cited
2008
Location privacy and anonymity preserving routing for wireless sensor networks
Alireza A. Nezhad
,
A. Miri
,
D. Makrakis
Comput. Networks
2008
Corpus ID: 27638042
Highly Cited
2006
Highly Cited
2006
Model Checking Russian Cards
Hans van Ditmarsch
,
W. Hoek
,
R. V. D. Meyden
,
J. Ruan
MoChArt@CONCUR/SPIN
2006
Corpus ID: 16219004
Highly Cited
2005
Highly Cited
2005
Confidentiality performance of spectral-phase-encoded optical CDMA
T. Shake
Journal of Lightwave Technology
2005
Corpus ID: 19472783
Enhanced security has often been cited as an important benefit of optical code-division multiple-access (O-CDMA) signaling but…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
Highly Cited
2003
Highly Cited
2003
Balanced self-checking asynchronous logic for smart card applications
S. Moore
,
Ross J. Anderson
,
R. Mullins
,
G. Taylor
,
J. Fournier
Microprocessors and microsystems
2003
Corpus ID: 2186513
Highly Cited
2000
Highly Cited
2000
Securing electronic commerce: reducing the SSL overhead
G. Apostolopoulos
,
V. Peris
,
P. Pradhan
,
Diptikalyan Saha
IEEE Network
2000
Corpus ID: 14725417
The last couple of years have seen a growing momentum toward using the Internet for conducting business. Web-based electronic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE