Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Encryption software

Known as: Cryptographic software, File Encryption, File encryption software 
Encryption software is software that can encrypt and decrypt data, often in the form of files on a hard drive or packets sent over a network.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented using a function of the… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
As cloud computing becomes prevalent, more and more sensitive information is being centralized into the cloud, which raises a new… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and also it has to support… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
  • Nate Lawson
  • IEEE Security & Privacy
  • 2009
  • Corpus ID: 16125684
When it comes to cryptographic software, side channels are an often-overlooked threat. A side channel is any observable side… Expand
  • figure 1
Is this relevant?
2008
2008
This paper presents an algorithm of digital watermark embedding in the middle frequency adaptively based on the DCT domain… Expand
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Pretty Good Privacy [3], or PGP, is a milestone in the history of cryptography, because for the first time it makes cryptography… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Abstract.We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 5
  • figure 4
Is this relevant?
2002
2002
  • E. Casey
  • Int. J. Digit. EVid.
  • 2002
  • Corpus ID: 14120878
The threat [of encryption] is manifest in four ways: failure to get evidence needed for convictions, failure to get intelligence… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We present a novel approach to improving the security of passwords. In our approach, the legitimate user's typing patterns (e.g… Expand
  • figure 3
  • figure 2
  • figure 5
  • figure 4
Is this relevant?