Skip to search formSkip to main contentSkip to account menu

Cryptography

Known as: Cyptography, Crypto, Mathematical cryptography 
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Introduction A fundamental objective of cryptography is to enable two persons to communicate over an insecure channel (a public… 
Highly Cited
2008
Highly Cited
2008
We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen… 
Highly Cited
2008
Highly Cited
2008
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of… 
Highly Cited
2004
Highly Cited
2004
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot protect against attacks that… 
Highly Cited
2004
Highly Cited
2004
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same… 
Highly Cited
2003
Highly Cited
2003
In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes… 
Highly Cited
2002
Highly Cited
2002
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the… 
Highly Cited
2001
Highly Cited
2001
This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several… 
Review
1996
Review
1996
Introduction and philosophy Chinese remainder algorithm in modular computations in algorithmics in bridging computations in… 
Highly Cited
1985
Highly Cited
1985
This paper describes a cryptographic scheme for holding a secure secret ballot election in which all communication is public…