Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,499,019 papers from all fields of science
Search
Sign In
Create Free Account
Padding (cryptography)
Known as:
Padding (disambiguation)
, Security padding
In cryptography, padding refers to a number of distinct practices.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Alice and Bob
Binary number
Block cipher
Block cipher mode of operation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
THE ADHESION PROPERTIES OF WOOD PRESERVED WITH NATURAL PRESERVATIVES
T. A. Prayitno
,
R. Widyorini
2016
Corpus ID: 53528582
Wood preservation technology has been using synthetic preservatives for a long time. However, some disadvantages have been…
Expand
2014
2014
TECHNOLOGY Modifying SHA-512 using Padding, Tree structure and Permutation Boxes
Sumit Tyagi
,
Babu Banarsi
2014
Corpus ID: 61997742
In this age of technology internet has become a day to day necessity. With this growing usage of web data it has become very…
Expand
2012
2012
Advil: A Pain Reliever for the Storage Performance of Mobile Devices
Je-Min Kim
,
Jin-Soo Kim
IEEE International Conference on Computational…
2012
Corpus ID: 11633520
Recently, mobile devices are demanding more performance in computing power, network, and storage. Among these components, storage…
Expand
2012
2012
Parameterized Uniform Complexity in Numerics: from Smooth to Analytic, from NP-hard to Polytime
A. Kawamura
,
N. Müller
,
Carsten Rösnick
,
M. Ziegler
arXiv.org
2012
Corpus ID: 14816885
The synthesis of classical Computational Complexity Theory with Recursive Analysis provides a quantitative foundation to reliable…
Expand
2011
2011
Security Analysis of Randomize-Hash-then-Sign Digital Signatures
Praveen Gauravaram
,
L. Knudsen
Journal of Cryptology
2011
Corpus ID: 253633038
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature…
Expand
Review
2009
Review
2009
Formal verification of C systems code Structured types, separation logic and theorem proving
Harvey Tuch
2009
Corpus ID: 13937695
Systems code is almost universally written in the C programming language or a variant. C has a very low level of type and memory…
Expand
2009
2009
A NOVEL APPROACH FOR CONTRAST ENHANCEMENT BASED ON HISTOGRAM EQUALIZATION FOLLOWED BY MEDIAN FILTER
P. Jagatheeswari
,
S. S. Kumar
,
M. Rajaram
2009
Corpus ID: 67762621
The goal of image enhancement technique is to improve the characteristics or quality of an image, such that the resulting image…
Expand
2005
2005
CASL Perfusion MRI in Normal Infant Brain Development
Z. Wang
,
M. Fernández-Seara
,
+4 authors
J. Detre
2005
Corpus ID: 8214388
Introduction Imaging changes in regional brain function with development may provide new insights into brain organization. MRI is…
Expand
2005
2005
The fast Fourier transform for experimentalists
D. Donnelly
,
B. Rust
Comput. Sci. Eng.
2005
Corpus ID: 206457005
In part one of this series, we discussed several basic properties of the fast Fourier transform (FFT). In addition to fundamental…
Expand
1997
1997
Der distal gestielte Suralislappen zur Defektdeckung posttraumatischer und chronischer Hautweichteilläsionen am „kritischen“ Unterschenkel
H. Schepler
,
M. Sauerbier
,
G. Germann
Der Chirurg
1997
Corpus ID: 35614999
Summary. Vascular diseases and/or sequelae of various systemic diseases are frequently associated with therapy-resistant soft…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required