Skip to search formSkip to main contentSkip to account menu

Encryption

Known as: Encryption algorithms, List of ciphers, Encryption and decryption 
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications… 
Highly Cited
2013
Highly Cited
2013
Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different… 
Review
2012
Review
2012
Image encryption is vital to ensure confidential transmission and storage of images over internet. However a real-time image… 
Highly Cited
2010
Highly Cited
2010
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To… 
2010
2010
In the present era, wireless data transmission techniques are commonly used in electronic devices. For powering them connection… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
2005
2005
  • 2005
  • Corpus ID: 10331725
2003
2003
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership… 
2000
2000
  • J. MillenH. Ruess
  • 2000
  • Corpus ID: 2048891
Inductive proofs of secrecy invariants for cryptographic protocols can be facilitated by separating the protocol dependent part… 
1999
1999
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…