Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,157,382 papers from all fields of science
Search
Sign In
Create Free Account
Cryptography
Known as:
Cyptography
, Crypto
, Mathematical cryptography
Expand
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Backup
Block cipher mode of operation
CDMF
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Boolean Functions for Cryptography and Error-Correcting Codes
C. Carlet
,
Y. Crama
,
Peter L. Hammer
Boolean Models and Methods
2010
Corpus ID: 64505751
Introduction A fundamental objective of cryptography is to enable two persons to communicate over an insecure channel (a public…
Expand
Highly Cited
2008
Highly Cited
2008
Leakage-Resilient Cryptography
Stefan Dziembowski
,
Krzysztof Pietrzak
49th Annual IEEE Symposium on Foundations of…
2008
Corpus ID: 1163648
We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen…
Expand
Highly Cited
2008
Highly Cited
2008
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
G. D. Meulenaer
,
F. Gosset
,
François-Xavier Standaert
,
Olivier Pereira
IEEE International Conference on Wireless and…
2008
Corpus ID: 8890563
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of…
Expand
Highly Cited
2004
Highly Cited
2004
Physically Observable Cryptography (Extended Abstract)
S. Micali
,
Leonid Reyzin
Theory of Cryptography Conference
2004
Corpus ID: 9137822
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot protect against attacks that…
Expand
Highly Cited
2004
Highly Cited
2004
Reusable cryptographic fuzzy extractors
Xavier Boyen
Conference on Computer and Communications…
2004
Corpus ID: 788435
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same…
Expand
Highly Cited
2003
Highly Cited
2003
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
G. Álvarez
,
Shujun Li
International Journal of Bifurcation and Chaos in…
2003
Corpus ID: 314070
In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes…
Expand
Highly Cited
2002
Highly Cited
2002
White-Box Cryptography and an AES Implementation
S. Chow
,
Philip A. Eisen
,
H. Johnson
,
P. V. Oorschot
ACM Symposium on Applied Computing
2002
Corpus ID: 14282272
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the…
Expand
Highly Cited
2001
Highly Cited
2001
Chaos and cryptography: block encryption ciphers based on chaotic maps
G. Jakimoski
,
L. Kocarev
2001
Corpus ID: 1424006
This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several…
Expand
Review
1996
Review
1996
Chinese remainder theorem: applications in computing, coding, cryptography
C. Ding
,
D. Pei
,
A. Salomaa
1996
Corpus ID: 116477998
Introduction and philosophy Chinese remainder algorithm in modular computations in algorithmics in bridging computations in…
Expand
Highly Cited
1985
Highly Cited
1985
A robust and verifiable cryptographically secure election scheme
Josh Benaloh
,
M. Fischer
26th Annual Symposium on Foundations of Computer…
1985
Corpus ID: 6820046
This paper describes a cryptographic scheme for holding a secure secret ballot election in which all communication is public…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE