Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,930,553 papers from all fields of science
Search
Sign In
Create Free Account
Cryptography
Known as:
Cyptography
, Crypto
, Mathematical cryptography
Expand
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Backup
Block cipher mode of operation
CDMF
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Cipher Text Policy Attribute-Based Encryption Supporting Flexible Attributes
Mr. M. D. Ghodeswar
,
D. S. S. Sherekar
,
D. Thakare
2017
Corpus ID: 20018192
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been a very active research area in recent years. Because of two…
Expand
2015
2015
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
S. Panda
,
Satyanarayana Gandi
,
Amarendra Kothalanka
2015
Corpus ID: 54641682
Secure and efficient data transmission is a critical issue for cluster-based wireless Sensor Networks (WSNs). In Cluster-based…
Expand
2012
2012
A S patial Domain Image Steganography Technique Based on Plane Bit Substitution Method
S. Sravanthi
,
Manu Devi
,
+6 authors
M Janga Reddy
2012
Corpus ID: 18938338
Abst ract - Steg anography is the art and science of hiding information by embedding data into cover media. In this paper we…
Expand
2011
2011
Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter
A. El-Sisi
˜The œinternational Arab journal of information…
2011
Corpus ID: 10837416
Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for…
Expand
2010
2010
Progress in Cryptology - INDOCRYPT 2010
G. Gong
,
K. Gupta
Lecture Notes in Computer Science
2010
Corpus ID: 1601757
Highly Cited
2007
Highly Cited
2007
Progress in Cryptology - VIETCRYPT 2006
Phong Q. Nguyen
2007
Corpus ID: 62958671
Highly Cited
2005
Highly Cited
2005
Integrity Primitives for Secure Information Systems
A. Bosselaers
,
B. Preneel
Lecture Notes in Computer Science
2005
Corpus ID: 12895857
2003
2003
An ultra high speed architecture for VLSI implementation of hash functions
N. Sklavos
,
G. Dimitroulakos
,
O. Koufopavlou
10th IEEE International Conference on Electronics…
2003
Corpus ID: 14607959
Today, security is a topic which attacks the great interest of researchers. Many encryption algorithms have been investigated…
Expand
Review
2002
Review
2002
Progress in Cryptology — INDOCRYPT 2002
A. Menezes
,
P. Sarkar
Lecture Notes in Computer Science
2002
Corpus ID: 13362644
The wide trail design strategy claims to design ciphers that are both efficient and secure against linear and differential…
Expand
Review
2000
Review
2000
Overview of IEEE 802.11b Security
S. Weatherspoon
2000
Corpus ID: 15065327
There is much regulatory and standards work in the area of security, especially in wireless. The wireless LAN standard IEEE 802…
Expand