Skip to search formSkip to main contentSkip to account menu

Cryptography

Known as: Cyptography, Crypto, Mathematical cryptography 
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In this paper will be described a new way of using cognitive approaches in personalized cryptography algorithms. Personal… 
Highly Cited
2016
Highly Cited
2016
In traditional authentication schemes for access control in mobile pay-TV systems, one-to-one delivery is used, i.e., one… 
Highly Cited
2014
Highly Cited
2014
Shortly following Cheon, Han, Lee, Ryu and Stehl e's attack against the multilinear map of Coron, Lepoint and Tibouchi (CLT), two… 
Highly Cited
2006
Highly Cited
2006
Highly Cited
2005
Highly Cited
2005
Enhanced security has often been cited as an important benefit of optical code-division multiple-access (O-CDMA) signaling but… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show… 
Highly Cited
2000
Highly Cited
2000
The last couple of years have seen a growing momentum toward using the Internet for conducting business. Web-based electronic…