Cryptography Research Papers - Academia.edu
About
Press
Papers
We're Hiring!
All Topics
Computer Science
Cryptography
Cryptography
description
37,824 papers
group
161,834 followers
lightbulb
About this topic
Cryptography is the study and practice of techniques for securing communication and information by transforming it into a format that is unreadable to unauthorized users. It encompasses various methods of encryption and decryption, ensuring confidentiality, integrity, and authenticity of data in digital and physical forms.
lightbulb
About this topic
Cryptography is the study and practice of techniques for securing communication and information by transforming it into a format that is unreadable to unauthorized users. It encompasses various methods of encryption and decryption, ensuring confidentiality, integrity, and authenticity of data in digital and physical forms.
Advanced encryption standard
1.5K Papers
59 Followers
Advanced Encryption Standard (AES)
14 Papers
12 Followers
Advanced Encryption Standards
120 Papers
148 Followers
Advanced encryption system
9 Papers
16 Followers
AES-128 Block Cipher
10 Papers
14 Followers
AES: Advanced Encryption Standard
12 Papers
8 Followers
AES algorithm
29 Papers
11 Followers
AES Cipher
13 Papers
9 Followers
AES encryption
45 Papers
15 Followers
Algorithm Cryptography Vigenere Cipher
7 Papers
3 Followers
Algorithms Cryptography
6 Papers
18 Followers
A New Dynamic Hash Algorithm in Digital Signature
15 Papers
4 Followers
Applied Cryptography
741 Papers
8.77K Followers
Asymmetric algorithm
13 Papers
3 Followers
Asymmetric Cryptosystem
9 Papers
9 Followers
Asymmetric Data Encryption
6 Papers
3 Followers
Asymmetric Encryption
16 Papers
5 Followers
Asymmetric Encryptions
10 Papers
7 Followers
Asymmetric Key Cryptography
34 Papers
5 Followers
Attribute Based Cryptography
8 Papers
10 Followers
Attribute Based Encryption
660 Papers
56 Followers
Attribute Based Encryption (ABE)
11 Papers
2 Followers
Attribute Based Signature
11 Papers
3 Followers
Authenticated Encryption
394 Papers
2 Followers
Authenticated Key Exchange
242 Papers
8 Followers
Authentication and Key Agreement
15 Papers
3 Followers
Bijective S-Box
6 Papers
16 Followers
Blind Signature
526 Papers
29 Followers
Block Chaining
7 Papers
3 Followers
Block Cipher
3.35K Papers
1.4K Followers
Block Cipher Chaining
16 Papers
6 Followers
Block Ciphers
194 Papers
54 Followers
Block Scrambling
10 Papers
11 Followers
Blowfish Encryption
9 Papers
0 Followers
Broadcast Encryption
178 Papers
3 Followers
Certificate less authenticated key agreement
21 Papers
0 Followers
Chaos-based cryptography
53 Papers
15 Followers
Chaotic cryptography
364 Papers
5.49K Followers
Chaotic Cryptosytems
7 Papers
1 Follower
Chaotic Encryption
22 Papers
9 Followers
Chaotic Stream Cipher
7 Papers
1 Follower
Cipher Algorithms
22 Papers
0 Followers
Cipher text
78 Papers
2 Followers
Cipher Text (CP)
8 Papers
2 Followers
ciphertext-only attack
7 Papers
1 Follower
Ciphertext-Only Attacks
9 Papers
0 Followers
Ciphertext Policy
16 Papers
1 Follower
Ciphertext Policy Attribute Based Encryption
14 Papers
1 Follower
Cipher Text-Policy Attribute-Based Encryption
8 Papers
14 Followers
Classical Cryptography (CC)
11 Papers
1 Follower
Classification of Efficient Symmetric Key Cryptography Algorithms
7 Papers
2 Followers
Classified Cloning Scheme
23 Papers
6 Followers
Compressed domain reversible steganography
9 Papers
1 Follower
Correlation Power Analysis
30 Papers
1 Follower
Crypto-Architectures.
15 Papers
2 Followers
Cryptographic Algorithm
1.03K Papers
65 Followers
Cryptographic Algorithms
27 Papers
0 Followers
Cryptographically Generated Addresses
16 Papers
1 Follower
Cryptographic Attacks
9 Papers
3 Followers
Cryptographic Engineering
240 Papers
1.01K Followers
Cryptographic Hash Function
779 Papers
71 Followers
Cryptographic Hash Functions
86 Papers
59 Followers
Cryptographic primitives
44 Papers
1 Follower
Cryptographic Protocols
2.33K Papers
640 Followers
Cryptographic Puzzles
13 Papers
25 Followers
Cryptography and applications
25 Papers
0 Followers
Cryptography Engineering
42 Papers
838 Followers
Cryptography Protocols
6 Papers
0 Followers
Data and Network Security, Coding, Number Theory and Cryptography
10 Papers
4 Followers
Data Encryption
999 Papers
557 Followers
Data Encryption Standard
780 Papers
215 Followers
Data Encryption standards (DES)
13 Papers
0 Followers
Data Encryption System
9 Papers
1 Follower
Decentralized group key
8 Papers
0 Followers
DES Algorithm
9 Papers
0 Followers
Differential cryptanalysis
524 Papers
195 Followers
Differential Privacy
1.19K Papers
115 Followers
Diffie-Hellman algorithm
12 Papers
0 Followers
Digital Image Encryption And Decryption
6 Papers
2 Followers
Digital Signature
4.15K Papers
7.7K Followers
DNA cryptography
79 Papers
733 Followers
Dynamic Key
7 Papers
2 Followers
Ecc Algorithm
13 Papers
0 Followers
Egyptian cryptography
31 Papers
14 Followers
ElGamal Encryption Scheme
391 Papers
435 Followers
ElGamal signature scheme
152 Papers
0 Followers
Elliptical Curve Cryptography
12 Papers
3 Followers
Elliptic Curve Cryptography
6.26K Papers
4.62K Followers
Elliptic curve cryptosystem
382 Papers
4 Followers
Elliptic Curve Digital Signature Algorithm (ECDSA)
542 Papers
55 Followers
Elliptic Curves Cryptography
29 Papers
0 Followers
Encrypting Algorithm
11 Papers
4 Followers
Encryption Algorithm
64 Papers
41 Followers
Encryption Algorithms
791 Papers
14.5K Followers
Encryption and Decryption
91 Papers
232 Followers
Encryption and decryption of digital image
23 Papers
6 Followers
Encryption Decryption
15 Papers
9 Followers
Encryption key
30 Papers
1 Follower
encryption of power
2 Papers
0 Followers
Encryption Protocols
16 Papers
1 Follower
Encryption Software
142 Papers
14 Followers
Encryption Time
9 Papers
0 Followers
End to End Encryption
31 Papers
5 Followers
Enkripsi Md5
12 Papers
71 Followers
Extended Visual Cryptography
10 Papers
20 Followers
Fair Exchange
242 Papers
1 Follower
File Encryption System Based on Symmetric Key Cryptography
23 Papers
4 Followers
Financial Cryptography
356 Papers
12 Followers
Firma Digital
77 Papers
24 Followers
Firma Digitale
35 Papers
31 Followers
Formal Verification of Cryptographic Protocols
107 Papers
607 Followers
Forward Security
129 Papers
0 Followers
Fully Homomorphic Encryption
71 Papers
51 Followers
Fully Homomorphic Encryptions
48 Papers
77 Followers
Functional encryption
99 Papers
1 Follower
Fuzzy Vault
7 Papers
1 Follower
Garbled Circuits
22 Papers
3 Followers
Group key
309 Papers
4 Followers
Group Key Agreement
158 Papers
0 Followers
Group Key Exchange
62 Papers
0 Followers
Group key management
305 Papers
46 Followers
Group Signature
364 Papers
4 Followers
Hash Signature
6 Papers
0 Followers
Hidden Information
655 Papers
3 Followers
Hiding Messages
9 Papers
0 Followers
Hiding Text
12 Papers
0 Followers
historical ciphers
6 Papers
0 Followers
Homomorphic Encryption
2.2K Papers
7.47K Followers
Hybrid Cryptosystem
398 Papers
3 Followers
Id Based Online Offline Digital Signature
11 Papers
0 Followers
Identity Based Cryptography
301 Papers
90 Followers
Identity-Based Cryptography
21 Papers
51 Followers
Identity based Encryption
296 Papers
86 Followers
Identity-Based Signature Schemes
77 Papers
10 Followers
Image Cryptography
16 Papers
2 Followers
Image Decryption
16 Papers
19 Followers
Image Encryption
1.16K Papers
4.28K Followers
Image Processing, Cryptography
9 Papers
7 Followers
Implementation of RSA Cryptosystem Using Verilog
10 Papers
10 Followers
In-Compression Encryption
15 Papers
2 Followers
Information Security and Cryptology
386 Papers
30 Followers
Information Theoretic Secrecy
8 Papers
0 Followers
Information theoretic security
447 Papers
10 Followers
Kerckhoffs' principle
32 Papers
1 Follower
Key Agreement
508 Papers
9 Followers
Key Agreement Protocols
89 Papers
67 Followers
Key Distribution
1.94K Papers
54 Followers
Key escrow
215 Papers
1 Follower
Key Establishment
514 Papers
4 Followers
Key Exchange
1.56K Papers
53 Followers
key exchange using Diffie Hellman
12 Papers
4 Followers
Key generation
622 Papers
34 Followers
Key Generation Center
8 Papers
0 Followers
Key Management
3.89K Papers
1.33K Followers
Key Management Schemes
10 Papers
0 Followers
Key Schedule
111 Papers
0 Followers
Key Sharing
9 Papers
0 Followers
Key Size
196 Papers
1 Follower
Known-Plaintext Attacks
11 Papers
0 Followers
KP-ABE
7 Papers
21 Followers
Lattice Based Cryptography
161 Papers
54 Followers
Lightweight Block Ciphers
89 Papers
87 Followers
Lightweight Cryptography
98 Papers
73 Followers
Lightweight Encryption
13 Papers
1 Follower
Lightweight public key Cryptography
10 Papers
5 Followers
Linear Cryptanalysis
447 Papers
34 Followers
Message Authentication
2.8K Papers
41 Followers
Message Authentication Code
541 Papers
2 Followers
MESSAGE AUTHENTICATION CODE(MAC)
254 Papers
2 Followers
Message Digest
34 Papers
1 Follower
Message Digest 5 Algorithm
20 Papers
16 Followers
Message recovery
7 Papers
0 Followers
Multimedia Encryption
9 Papers
0 Followers
Multi Party Computation
114 Papers
6 Followers
Multiple Encryption
312 Papers
10 Followers
Multi-secret Sharing
14 Papers
15 Followers
Music Cryptography
7 Papers
0 Followers
Neural Cryptography
106 Papers
5 Followers
Non-Malleability
10 Papers
0 Followers
Oblivious Transfer
452 Papers
24 Followers
one time pad
173 Papers
0 Followers
Optical Encryption
17 Papers
5 Followers
Pairing-based cryptography
244 Papers
26 Followers
Pairing-free
7 Papers
0 Followers
Partial Encryption
12 Papers
0 Followers
Password Encryption
52 Papers
1.38K Followers
perfect forward secrecy (PFS)
61 Papers
2 Followers
Perfect Secrecy
23 Papers
2 Followers
Performance of Cryptography
7 Papers
18 Followers
PKI (Cryptography)
110 Papers
2.22K Followers
Playfair Cipher
12 Papers
2 Followers
Post-Quantum Cryptography
469 Papers
285 Followers
Pretty Good Privacy
25 Papers
1 Follower
Private Information Retrieval
1.53K Papers
40 Followers
Private Key
224 Papers
4 Followers
Private-Key Encryption
23 Papers
5 Followers
Private Key Generator
24 Papers
1 Follower
Private Set Intersection
15 Papers
0 Followers
probabilistic encryption
505 Papers
20 Followers
Proof of Data Possession Scheme
16 Papers
0 Followers
Proof of knowledge
80 Papers
1 Follower
Proof of stake
28 Papers
16 Followers
Proof of work
26 Papers
1 Follower
Proof of Work (PoW)
27 Papers
13 Followers
Provable Security
1.23K Papers
79 Followers
Proxy Re-Encryption
216 Papers
13 Followers
Proxy Signature
159 Papers
15 Followers
Public key cryptography
6.11K Papers
866 Followers
Public key Cryptography algorithms
15 Papers
17 Followers
Public Key Cryptosystem
990 Papers
90 Followers
Public Key Cryptosystems
131 Papers
46 Followers
Public Key Crypto systems
347 Papers
10.8K Followers
Public Key Encryption
645 Papers
9 Followers
public key infrastructures
8 Papers
0 Followers
Public Key Protocols
8 Papers
2 Followers
Public/Private Keys
25 Papers
9 Followers
Quantum Cryptography
3.81K Papers
13K Followers
Quantum Encryption
13 Papers
4 Followers
Rainbow Table
8 Papers
1 Follower
Range Proof
6 Papers
0 Followers
RC4 algorithm
17 Papers
28 Followers
RC 6 Algorithm
17 Papers
2 Followers
Rijndael Algorithm
22 Papers
0 Followers
RSA ALGORITHM
281 Papers
2.41K Followers
Rsa Cryptography
65 Papers
127 Followers
RSA Cryptosystem
176 Papers
4 Followers
RSA encryption
23 Papers
12 Followers
S-Boxes
58 Papers
32 Followers
Searchable Encryption
48 Papers
1 Follower
Secrecy Capacity
37 Papers
0 Followers
Secret Communication
15 Papers
2 Followers
Secret Key
44 Papers
0 Followers
Secret-Key Cryptography
8 Papers
0 Followers
Secret Sharing
1.86K Papers
200 Followers
Secret Sharing Schemes
21 Papers
1 Follower
Secure Binary Embeddings
8 Papers
0 Followers
Secure Codes
10 Papers
0 Followers
Secure Computation
1.14K Papers
83 Followers
Secured Hashing Algorithm
6 Papers
0 Followers
Secure Function Evaluation
52 Papers
1 Follower
Secure Hash Algorithm
322 Papers
129 Followers
Secure Multi-party Computation
559 Papers
9 Followers
Secure Multiparty Computation
393 Papers
1.17K Followers
Secure Two-party Computation
107 Papers
1 Follower
Security Algorithms
6 Papers
0 Followers
Security in Visual Cryptography
16 Papers
107 Followers
Selective Disclosure
12 Papers
3 Followers
Selective Encryption
187 Papers
1 Follower
Selective Encryption of Video
12 Papers
1 Follower
SEMANTIC SECURITY
306 Papers
16 Followers
Session Based Key
10 Papers
0 Followers
Session Key
557 Papers
1 Follower
Sha-1
7 Papers
21 Followers
Shared secret key
92 Papers
1 Follower
Signature Generation
13 Papers
0 Followers
Signature Scheme
886 Papers
37 Followers
Signcryption Scheme
8 Papers
0 Followers
Slide Attack
21 Papers
5 Followers
Steganography and Cryptography
341 Papers
6.41K Followers
Stream Cipher
2.12K Papers
119 Followers
Stream Ciphers
157 Papers
9 Followers
Strong Cryptography
45 Papers
2 Followers
Substitution Cipher
16 Papers
1 Follower
Substitution Permutation Networks
15 Papers
0 Followers
Symmetric Algorithm
16 Papers
0 Followers
Symmetric Cipher
61 Papers
1 Follower
Symmetric cryptography
72 Papers
3 Followers
Symmetric Cryptosystem
9 Papers
0 Followers
Symmetric Key
83 Papers
5 Followers
Symmetric Key Cryptography
130 Papers
13 Followers
Symmetric key encryption
179 Papers
32 Followers
Symmetric Keys
13 Papers
0 Followers
symmetric searchable encryption
9 Papers
5 Followers
Test Vectors
15 Papers
95 Followers
three pass protocol
11 Papers
1 Follower
Threshold Cryptography
239 Papers
9 Followers
Threshold Signature
92 Papers
2 Followers
Traitor tracing
177 Papers
30 Followers
Transposition Cipher
236 Papers
13 Followers
Triple DES
157 Papers
7 Followers
Unconditional Security
119 Papers
1 Follower
Verifiable Secret Sharing
1.3K Papers
21 Followers
Vernam Cipher
12 Papers
0 Followers
Video Encryption
31 Papers
292 Followers
Video Encryption /Decryption
20 Papers
49 Followers
Visual Cryptography
845 Papers
5.48K Followers
Visual Secret Sharing
78 Papers
3 Followers
Watermarking,Steganography,Cryptography
6 Papers
5 Followers
White-Box Cryptography
10 Papers
3 Followers
Wiretap Channel
27 Papers
7 Followers
Zero-Knowledge Proofs
672 Papers
100 Followers
Zero Knowledge Protocols
27 Papers
17 Followers
Download research papers for
free
Join us
arrow_forward
Explore
Papers
Topics
Features
Mentions
Analytics
PDF Packages
Advanced Search
Search Alerts
Journals
Academia.edu Journals
My submissions
Reviewer Hub
Why publish with us
Testimonials
Company
About
Careers
Press
Content Policy
580 California St., Suite 400
San Francisco, CA, 94104