Skip to search formSkip to main contentSkip to account menu

Cryptography

Known as: Cyptography, Crypto, Mathematical cryptography 
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been a very active research area in recent years. Because of two… 
2014
2014
Abstract The rapid growth of covert activities via communications network brought about an increasing need to provide an… 
2011
2011
The scope of mobile phones has skyrocketed in recent years to such an extent that smartphone sales are expected to surpass those… 
2011
2011
Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for… 
Highly Cited
2007
Highly Cited
2007
Highly Cited
2007
Highly Cited
2007
Gold nanoparticles are formed to cover the surface of sulfonated-polystyrene (PS) beads by the in-situ ion-exchange and chemical… 
Highly Cited
2006
Highly Cited
2006
  • H. SarmaA. Kar
  • 2006
  • Corpus ID: 25125873
Wireless sensor network (WSN) is an emerging field. Theses are normally designed to perform a set of high level information… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show… 
Review
2002
Review
2002
The wide trail design strategy claims to design ciphers that are both efficient and secure against linear and differential…