Skip to search formSkip to main contentSkip to account menu

Encryption

Known as: Encryption algorithms, List of ciphers, Encryption and decryption 
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications… 
Highly Cited
2010
Highly Cited
2010
RC5 is a well-known block cipher notable for its simplicity, speed, suitability for hardware and software implementation, and its… 
Highly Cited
2010
Highly Cited
2010
We propose a novel scheme for selective distribution of content, encoded as documents, that preserves the privacy of the users to… 
Highly Cited
2006
Highly Cited
2006
In this paper, the prototype development of a wrist-worn integrated health monitoring device (WIHMD) with tele-reporting function… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
Highly Cited
2005
Highly Cited
2005
Traditional data transmission over an insecure noiseless channel consists of first compressing data for efficiency and then… 
Highly Cited
2000
Highly Cited
2000
This paper describes MiddleMan, a collection of cooperating proxy servers connected by a local area network (LAN). MiddleMan… 
Highly Cited
1999
Highly Cited
1999
. This essay presents some observations concerning low rate steganography in images where the amount of covert information is… 
Highly Cited
1965
Highly Cited
1965
This brief reports on an experimental test of a hologram technique that is capable of projecting ulldistorted images through…