Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,894,454 papers from all fields of science
Search
Sign In
Create Free Account
Encryption software
Known as:
Cryptographic software
, File Encryption
, File encryption software
Encryption software is software that can encrypt and decrypt data, often in the form of files on a hard drive or packets sent over a network.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
AxCrypt
Block cipher
Block cipher mode of operation
Bring your own encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Interoperable conditional access with video selective encryption for portable devices
M. Asghar
,
M. Fleury
,
S. Makki
Multimedia tools and applications
2016
Corpus ID: 26722713
The pay-TV industry seeks to extend its reach to portable display devices. At the same time, it seeks to ensure a horizontal…
Expand
2016
2016
Securing Files in the Cloud
Bharati Mishra
,
Debasish Jena
IEEE International Conference on Cloud Computing…
2016
Corpus ID: 16999244
Dropbox, Google Drive, OneDrive, Box etc are popular File Storage providers for the Cloud. Recently reported vulnerability like…
Expand
Review
2016
Review
2016
Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software
A. Zankl
,
Johann Heyszl
,
G. Sigl
Smart Card Research and Advanced Application…
2016
Corpus ID: 40648951
The shared instruction cache of modern processors is an established side-channel that allows adversaries to observe the execution…
Expand
Highly Cited
2013
Highly Cited
2013
A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture
Kawser Wazed Nafi
,
Tonny Shekha Kar
,
Sayed Anisul Hoque
,
M. Hashem
arXiv.org
2013
Corpus ID: 1722177
The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the…
Expand
2010
2010
Research and design of full disk encryption based on virtual machine
Min Liang
,
Chao-wen Chang
International Conference on Computer Science and…
2010
Corpus ID: 14355613
Encryption is an effective method to protect private information. But the operating system and the temporary file of privacy are…
Expand
2010
2010
Implementing virtual secure circuit using a custom-instruction approach
Zhimin Chen
,
A. Sinha
,
P. Schaumont
International Conference on Compilers…
2010
Corpus ID: 14209425
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with…
Expand
2008
2008
An Adaptive Middle Frequency Embedded Digital Watermark Algorithm Based on the DCT Domain
Liang Tan
,
Z. Fang
International Conference on Management of e…
2008
Corpus ID: 31707227
This paper presents an algorithm of digital watermark embedding in the middle frequency adaptively based on the DCT domain…
Expand
2008
2008
Cryptographic System on a Chip based on Actel ARM7 Soft-Core with Embedded True Random Number Generator
M. Drutarovský
,
M. Varchola
IEEE Workshop on Design and Diagnostics of…
2008
Corpus ID: 2474322
The paper introduces a cryptographic system on a chip (SoC) implementation based on recent Actel nonvolatile FPGA Fusion chip…
Expand
Review
2007
Review
2007
Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography
Yi Lu
,
Jean Monnerat
2007
Corpus ID: 61506774
* Cryptography is the study of message secrecy and is used in fields such as computer science, computer and network security, and…
Expand
2002
2002
Practical Approaches to Recovering Encrypted Digital Evidence
E. Casey
International Journal of Digital Evidence
2002
Corpus ID: 14120878
The threat [of encryption] is manifest in four ways: failure to get evidence needed for convictions, failure to get intelligence…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required