Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Encrypt

Known as: Encrypt (movie) 
Encrypt is a television movie that premiered June 14, 2003 on the Sci-Fi Channel. Set in the year 2068, the Earth's surface is in a cataclysmic… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Logic Encryption is one of the most popular hardware security techniques which can prevent IP piracy and illegal IC… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
2015
2015
This paper presents the results of a laboratory study involving Mailvelope, a modern PGP client that integrates tightly with… Expand
  • table 1
  • figure 1
Is this relevant?
2011
2011
APCO Project 25 ("P25") is a suite of wireless communications protocols used in the US and elsewhere for public safety two-way… Expand
  • figure 1
  • figure 2
  • figure 8-3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that… Expand
Is this relevant?
2008
2008
  • Jan Sousedek
  • 2008
  • Corpus ID: 2892173
Interfaces of security software are very often clumsy or confusing. Users are dealing with bad usability standard, that this type… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a probabilistic private-key encryption scheme named LPN-C whose security can be reduced to the hardness of the… Expand
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The secure shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2003
2003
Although security is normally thought of as a technical problem, we believe that it is more appropriately formulated as a… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?