Skip to search formSkip to main contentSkip to account menu

Encryption

Known as: Encryption algorithms, List of ciphers, Encryption and decryption 
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database… 
Highly Cited
2007
Highly Cited
2007
The Advanced Encryption Standard (AES), which implements the Rijndael cipher, is a symmetric block cipher that was developed as a… 
Highly Cited
2007
Highly Cited
2007
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the… 
Highly Cited
2004
Highly Cited
2004
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user… 
Highly Cited
2004
Highly Cited
2004
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily… 
Highly Cited
2002
Highly Cited
2002
In this paper, we describe the Advanced Encryption Standard (AES), which has been approved after an international competition by… 
Highly Cited
1997
Highly Cited
1997
  • Yuliang Zheng
  • Annual International Cryptology Conference
  • 1997
  • Corpus ID: 130522
Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The… 
Highly Cited
1997
Highly Cited
1997
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. We give four different… 
Highly Cited
1994
Highly Cited
1994
  • R. Rivest
  • Fast Software Encryption Workshop
  • 1994
  • Corpus ID: 1865634
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software… 
Highly Cited
1994
Highly Cited
1994
Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encryption scheme for which (i) any…