Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,958,520 papers from all fields of science
Search
Sign In
Create Free Account
Padding (cryptography)
Known as:
Padding (disambiguation)
, Security padding
In cryptography, padding refers to a number of distinct practices.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Alice and Bob
Binary number
Block cipher
Block cipher mode of operation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A modified S10B silicone plastination method for preparation and preservation of scaled reptile specimens
Ekim Okan
,
Haziroğlu
2017
Corpus ID: 59495805
Surungen preparatlarinin hazirlanmasi ve uzun sureli muhafazasi faaliyetleri, titiz bir calisma gerektirir. Plastinasyon…
Expand
2016
2016
Code design for adaptive coding and modulation indicator in broadcast systems
F. Kayhan
,
G. Montorsi
International Journal of Satellite Communications…
2016
Corpus ID: 19975574
In this paper, we address the coding problem for adaptive coding and modulator indicators in communication systems where users…
Expand
2012
2012
Parameterized Uniform Complexity in Numerics: from Smooth to Analytic, from NP-hard to Polytime
A. Kawamura
,
N. Müller
,
Carsten Rösnick
,
M. Ziegler
arXiv.org
2012
Corpus ID: 14816885
The synthesis of classical Computational Complexity Theory with Recursive Analysis provides a quantitative foundation to reliable…
Expand
2010
2010
A Hardware Wrapper for the SHA-3 Hash Algorithms
Brian Baldwin
,
A. Byrne
,
+4 authors
W. Marnane
IACR Cryptology ePrint Archive
2010
Corpus ID: 15273392
The second round of the NIST public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash…
Expand
Review
2009
Review
2009
Formal verification of C systems code Structured types, separation logic and theorem proving
Harvey Tuch
2009
Corpus ID: 13937695
Systems code is almost universally written in the C programming language or a variant. C has a very low level of type and memory…
Expand
2009
2009
A NOVEL APPROACH FOR CONTRAST ENHANCEMENT BASED ON HISTOGRAM EQUALIZATION FOLLOWED BY MEDIAN FILTER
P. Jagatheeswari
,
S. S. Kumar
,
M. Rajaram
2009
Corpus ID: 67762621
The goal of image enhancement technique is to improve the characteristics or quality of an image, such that the resulting image…
Expand
2009
2009
Performance Research of Polyester Fabric Treated by Nano Titanium Dioxide (N ano-TiO2) Anti-ultraviolet Finishing
Haixia Li
,
Hua Deng
,
J. Zhao
2009
Corpus ID: 45360194
Nano-TiO2 sol and finishing agent was prepared by sol-gel method, during which tetrabutyl titanate was used as precursor and…
Expand
2005
2005
The fast Fourier transform for experimentalists
D. Donnelly
,
B. Rust
Comput. Sci. Eng.
2005
Corpus ID: 206457005
In part one of this series, we discussed several basic properties of the fast Fourier transform (FFT). In addition to fundamental…
Expand
1999
1999
A real-time realization of MPEG-4 video decoder
Lap-Pui Chau
,
N. Ling
,
G. Hovden
,
H. Lan
,
H. Ng
,
K. Lim
ISCAS'99. Proceedings of the IEEE International…
1999
Corpus ID: 30505081
In this paper, several techniques for real-time realization of an MPEG-4 video decoder software is presented. The structure of…
Expand
1997
1997
Der distal gestielte Suralislappen zur Defektdeckung posttraumatischer und chronischer Hautweichteilläsionen am „kritischen“ Unterschenkel
H. Schepler
,
M. Sauerbier
,
G. Germann
Der Chirurg
1997
Corpus ID: 35614999
Summary. Vascular diseases and/or sequelae of various systemic diseases are frequently associated with therapy-resistant soft…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE