Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,297,879 papers from all fields of science
Search
Sign In
Create Free Account
Cryptography
Known as:
Cyptography
, Crypto
, Mathematical cryptography
Expand
Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Backup
Block cipher mode of operation
CDMF
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Cipher Text Policy Attribute-Based Encryption Supporting Flexible Attributes
Mr. M. D. Ghodeswar
,
D. S. S. Sherekar
,
D. Thakare
2017
Corpus ID: 20018192
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been a very active research area in recent years. Because of two…
Expand
2014
2014
Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding
Ali M. Ahmad
,
G. Sulong
,
A. Rehman
,
M. H. Alkawaz
,
T. Saba
Journal of Intelligent Systems
2014
Corpus ID: 39333606
Abstract The rapid growth of covert activities via communications network brought about an increasing need to provide an…
Expand
2011
2011
Reclaiming privacy for smartphone applications
Emiliano De Cristofaro
,
A. Durussel
,
I. Aad
Annual IEEE International Conference on Pervasive…
2011
Corpus ID: 11431539
The scope of mobile phones has skyrocketed in recent years to such an extent that smartphone sales are expected to surpass those…
Expand
2011
2011
Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter
Ashraf El-Sisi
˜The œinternational Arab journal of information…
2011
Corpus ID: 10837416
Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for…
Expand
Highly Cited
2007
Highly Cited
2007
Progress in Cryptology - VIETCRYPT 2006
Phong Q. Nguyen
2007
Corpus ID: 62958671
Highly Cited
2007
Highly Cited
2007
Direct Metallization of Gold Nanoparticles on a Polystyrene Bead Surface using Cationic Gold Ligands
Jun-Ho Lee
,
Dongouk Kim
,
Gyu-Seok Song
,
Youngkwan Lee
,
Seung-Boo Jung
,
J. Nam
2007
Corpus ID: 54981370
Gold nanoparticles are formed to cover the surface of sulfonated-polystyrene (PS) beads by the in-situ ion-exchange and chemical…
Expand
Highly Cited
2006
Highly Cited
2006
Security Threats in Wireless Sensor Networks
H. Sarma
,
A. Kar
Proceedings 40th Annual International Carnahan…
2006
Corpus ID: 25125873
Wireless sensor network (WSN) is an emerging field. Theses are normally designed to perform a set of high level information…
Expand
Highly Cited
2005
Highly Cited
2005
Integrity Primitives for Secure Information Systems
A. Bosselaers
,
B. Preneel
Lecture Notes in Computer Science
2005
Corpus ID: 12895857
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
Review
2002
Review
2002
Progress in Cryptology — INDOCRYPT 2002
A. Menezes
,
P. Sarkar
Lecture Notes in Computer Science
2002
Corpus ID: 13362644
The wide trail design strategy claims to design ciphers that are both efficient and secure against linear and differential…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required