Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,697,549 papers from all fields of science
Search
Sign In
Create Free Account
History of cryptography
Known as:
History of cryptanalysis
, History of encryption
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
47 relations
Algorithm
Alice and Bob
Babington Plot
Battle of Midway
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Cyber Security- A New Secured Password Generation Algorithm with Graphical Authentication and Alphanumeric Passwords Along With Encryption
A. Rao
2019
Corpus ID: 198344360
CYBER SECURITYA NEW SECURED PASSWORD GENERATION ALGORITHM WITH GRAPHICAL AUTHENTICATION, AND ALPHANUMERIC PASSWORDS ALONG WITH…
Expand
2014
2014
Mathematics in the History of Cryptography
C. F. Rocca
Cryptologia
2014
Corpus ID: 38996869
Abstract For eight years, the author has taught a course in cryptology for undergraduate non-mathematics majors [15]. However…
Expand
2013
2013
Low Power FPGA Based Elliptical Curve Cryptography
S. Ajay
,
H. Kotresh
,
S. ShruthiB
,
S. SwethaG
,
B. Srividya
2013
Corpus ID: 61592750
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The development of public…
Expand
Review
2010
Review
2010
TCP/IP - The Ultimate Protocol Guide: Complete 2 Volume Set
Philip M. Miller
2010
Corpus ID: 60929548
This is the complete 2 volume set, containing both volumes one (ISBN: 9781599424910) and two (ISBN: 9781599425436) packaged…
Expand
2010
2010
Codes, not ciphers
J. Baylis
Mathematical Gazette
2010
Corpus ID: 61793651
This article is written as a companion piece to the recent account of cryptography in [1]. The aim will be similar—to explain the…
Expand
2009
2009
TCP/IP - The Ultimate Protocol Guide: Volume 1 - Data Delivery and Routing
Philip M. Miller
2009
Corpus ID: 63978738
TCP/IP - The Ultimate Protocol Guide is written to cover all facets of the Internet Protocol suite. This two volume set makes no…
Expand
2008
2008
Vigenère through Shannon to planck — a short history of electronic cryptographic systems
P. Hill
IEEE History of Telecommunications Conference
2008
Corpus ID: 26219735
The history of cryptography goes right back to ancient times but modern electronic coding for secrecy essentially uses similar…
Expand
1999
1999
History of Encryption Policy in the United States
T. Maegawa
1999
Corpus ID: 169243206
1985
1985
On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research
Tom Tedrick
International Conference on the Theory and…
1985
Corpus ID: 28567706
This paper will discuss the role of cryptography within a particular “world view”, with the aim of investigating the history and…
Expand
Review
1983
Review
1983
Tutorial: The security of data in networks : Donald W. Davies: Silver Spring MD: IEEE Computer Society, 1981. vi + 241 pp., $20.00 to non-members and $15.00 to members of IEEE
H. Highland
Computers & security
1983
Corpus ID: 46150990
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required