Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,759 papers from all fields of science
Search
Sign In
Create Free Account
Encrypt
Known as:
Encrypt (movie)
Encrypt is a television movie that premiered June 14, 2003 on the Sci-Fi Channel. Set in the year 2068, the Earth's surface is in a cataclysmic…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Holograph
Robot
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Using a Chaotic Cipher to Encrypt Ethernet Traffic
A. Pérez-Resa
,
M. Garcia-Bosque
,
C. Sánchez-Azqueta
,
S. Celma
International Symposium on Circuits and Systems
2018
Corpus ID: 53085878
In this work a new physical layer encryption method for Ethernet 1000Base-X standard is proposed. The proposed encryption scheme…
Expand
2017
2017
An AES–CHAOS-Based Hybrid Approach to Encrypt Multiple Images
Shelza Suri
,
R. Vijay
2017
Corpus ID: 64830897
In today’s world, one thing is for sure that technologies have advanced. Internet is being used as the primary mode of transfer…
Expand
2015
2015
FPGA based implementation of elliptic curve cryptography
M. Nawari
,
Hazim Ahmed
,
A. Hamid
,
Mohamed Elkhidir
World Symposium on Computer Networks and…
2015
Corpus ID: 7747782
Elliptic curve cryptography is a public key cryptography technique based on the algebraic structure of elliptic curves over…
Expand
2015
2015
SIPHER: Scalable Implementation of Primitives for Homomorphic Encryption
David Cousins
,
Kurt Rohloff
,
Christopher Peikert
,
Daniel Sumorok
2015
Corpus ID: 51854013
Abstract : The goal of SIPHER was to improve the efficiency and scalability of Fully Homomorphic Encryption (FHE). Significant…
Expand
2015
2015
Homomorphic Autocomplete
Gizem S. Çetin
,
Wei Dai
,
Yarkin Doröz
,
B. Sunar
IACR Cryptology ePrint Archive
2015
Corpus ID: 17864341
With the rapid progress in fully homomorpic encryption (FHE) and somewhat homomorphic encryption (SHE) schemes, we are witnessing…
Expand
2015
2015
Why Won't Johnny Encrypt?
H. Orman
IEEE Internet Computing
2015
Corpus ID: 487792
Very little Internet communication is truly private, even if it is encrypted. The original concept for email privacy dates back a…
Expand
2014
2014
Implementation, Comparison, and Enhancement of Secure Communication Designs
Aya Elshobaky
,
G. F. El-Kabbany
,
Mohamed Rasslan
,
Shawkat K. Gurguis
EUSPN/ICTH
2014
Corpus ID: 2846548
2011
2011
Data Management Recommendations for Research Centres and Programmes
Laurence Horton
,
V. Eynden
,
Louise Corti
,
L. Bishop
2011
Corpus ID: 182043971
The Data Management Planning for ESRC Research Data-Rich Investments project (DMP-ESRC) is funded by the Joint Information…
Expand
2010
2010
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
J. Guajardo
,
Bart Mennink
IACR Cryptology ePrint Archive
2010
Corpus ID: 12191009
Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box secure block cipher based…
Expand
1999
1999
Users' Security Handbook
E. Guttman
,
Lorna Leong
,
G. Malkin
Request for Comments
1999
Corpus ID: 45760677
The Users' Security Handbook is the companion to the Site Security Handbook (SSH). It is intended to provide users with the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE