Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,215,043 papers from all fields of science
Search
Sign In
Create Free Account
Encryption
Known as:
Encryption algorithms
, List of ciphers
, Encryption and decryption
Expand
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
Anonym.OS
Backup
Certificate policy
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Order-Preserving Symmetric Encryption
A. Boldyreva
,
Nathan Chenette
,
Younho Lee
,
Adam O'Neill
IACR Cryptology ePrint Archive
2009
Corpus ID: 8859331
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database…
Expand
Highly Cited
2007
Highly Cited
2007
Advanced Encryption Standard
Brian A. Carter
,
A. Kassin
,
T. Magoc
2007
Corpus ID: 15215419
The Advanced Encryption Standard (AES), which implements the Rijndael cipher, is a symmetric block cipher that was developed as a…
Expand
Highly Cited
2007
Highly Cited
2007
Identity-Based Proxy Re-encryption
M. Green
,
G. Ateniese
International Conference on Applied Cryptography…
2007
Corpus ID: 1291954
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the…
Expand
Highly Cited
2004
Highly Cited
2004
Public Key Encryption with Keyword Search
D. Boneh
,
G. D. Crescenzo
,
R. Ostrovsky
,
G. Persiano
International Conference on the Theory and…
2004
Corpus ID: 929338
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user…
Expand
Highly Cited
2004
Highly Cited
2004
Order preserving encryption for numeric data
R. Agrawal
,
J. Kiernan
,
R. Srikant
,
Yirong Xu
ACM SIGMOD Conference
2004
Corpus ID: 3336127
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily…
Expand
Highly Cited
2002
Highly Cited
2002
THE ADVANCED ENCRYPTION STANDARD
W. Stallings
Cryptologia
2002
Corpus ID: 205486247
In this paper, we describe the Advanced Encryption Standard (AES), which has been approved after an international competition by…
Expand
Highly Cited
1997
Highly Cited
1997
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
Yuliang Zheng
Annual International Cryptology Conference
1997
Corpus ID: 130522
Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The…
Expand
Highly Cited
1997
Highly Cited
1997
A concrete security treatment of symmetric encryption
M. Bellare
,
Anand Desai
,
E. Jokipii
,
P. Rogaway
Proceedings 38th Annual Symposium on Foundations…
1997
Corpus ID: 42604387
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. We give four different…
Expand
Highly Cited
1994
Highly Cited
1994
The RC5 Encryption Algorithm
R. Rivest
Fast Software Encryption Workshop
1994
Corpus ID: 1865634
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software…
Expand
Highly Cited
1994
Highly Cited
1994
Optimal Asymmetric Encryption
M. Bellare
,
P. Rogaway
International Conference on the Theory and…
1994
Corpus ID: 41204165
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encryption scheme for which (i) any…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE