Cryptography

Known as: Cyptography, Crypto, Mathematical cryptography 
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Want to get experience? Want to get any ideas to create new things in your life? Read modern cryptography theory and practice now… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Two distinct, rigorous views of cryptography have developed over the years, in two mostly separate communities. One of the views… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Jiri. Sobotik
  • 2001
This paper discusses some aspects of testing random and pseudorandom number generators. A Statistical Test Suite for Random and… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
If you really want to be smarter, reading can be one of the lots ways to evoke and realize. Many people who like reading will… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
ebooks and guide Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptography Protocols Algorithms And… (More)
Is this relevant?
Highly Cited
1991
Highly Cited
1991
The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, the… (More)
  • figure 1
Is this relevant?
Highly Cited
1988
Highly Cited
1988
Suppose your netmail is being erratically censored by Captain Yossarian. Whenever you send a message, he censors each bit of the… (More)
Is this relevant?
Highly Cited
1976
Highly Cited
1976
Two kinds of contemporary developments in crypcommunications over an insecure channel order to use cryptogtography are examined… (More)
Is this relevant?