Encryption

Known as: Encryption algorithms, List of ciphers, Encryption and decryption 
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image… (More)
  • table 1
  • figure 1
  • figure 2
  • table 3
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Two distinct, rigorous views of cryptography have developed over the years, in two mostly separate communities. One of the views… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The increased popularity of multimedia applications places a great demand on eecient data storage and transmission techniques… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper presents a generic conversion from weak asymmetric and symmetric encryption schemes to an asymmetric encryption scheme… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
This document describes the RC encryption algorithm a fast symmetric block cipher suitable for hardware or software imple… (More)
Is this relevant?
Highly Cited
1978
Highly Cited
1978
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for… (More)
Is this relevant?