Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Encryption

Known as: Encryption algorithms, List of ciphers, Encryption and decryption 
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Ever since humans started talking, we have been trying to work out a way of communicating information to one person, while… Expand
Highly Cited
2009
Highly Cited
2009
In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard… Expand
Highly Cited
2006
Highly Cited
2006
Abstract In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure… Expand
  • table 1
  • figure 1
  • figure 2
  • table 3
  • table 2
Highly Cited
2004
Highly Cited
2004
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user… Expand
Highly Cited
2004
Highly Cited
2004
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2002
Highly Cited
2002
In this paper, we describe the Advanced Encryption Standard (AES), which has been approved after an international competition by… Expand
Highly Cited
1997
Highly Cited
1997
Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
1994
Highly Cited
1994
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software… Expand
Highly Cited
1994
Highly Cited
1994
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encryption scheme for which (i) any… Expand
Highly Cited
1987
Highly Cited
1987
Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard). Adaptee par l'Agence… Expand