Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,536,978 papers from all fields of science
Search
Sign In
Create Free Account
Strong cryptography
Known as:
Cryptographically strong
, Strong encryption
, Cryptographic strength
Expand
Strong cryptography or cryptographically strong are general terms applied to cryptographic systems or components that are considered highly resistant…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Advanced Encryption Standard process
Algorithm
Block cipher
Colossus computer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E
Amar Jaffar
,
Christopher J. Martinez
2013
Corpus ID: 11608181
and Technology (NIST) created an open competition to find a new standard for cryptographic hashing in 2007. The competition was…
Expand
2012
2012
GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Himika Parmar
,
Nancy Nainan
,
S. Thaseen
2012
Corpus ID: 6802255
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks…
Expand
Review
2011
Review
2011
On the identification and analysis of Skype traffic
S. Molnár
,
M. Perényi
International Journal of Communication Systems
2011
Corpus ID: 2233327
Skype applies strong encryption to provide secure communication inside the whole Skype network. It also uses several techniques…
Expand
2009
2009
Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm)
Masood Habib
,
T. Mehmood
,
Fasee Ullah
,
M. Ibrahim
International Conference on Computer Technology…
2009
Corpus ID: 10920223
IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next…
Expand
2009
2009
DNA Cryptographic Algorithms
O. Tornea
,
M. Borda
2009
Corpus ID: 60791184
DNA has a great cryptographic strength, its binding properties between nucleotides bases (A—T, C—G) offer the possibility to…
Expand
2009
2009
Secure Access of Smart Cards Using Elliptic Curve Cryptosystems
Kakali Chatterjee
,
D. Gupta
International Conference on Wireless…
2009
Corpus ID: 16366336
Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and financial transactions. Elliptic…
Expand
2007
2007
Skype Traffic Identification
M. Perényi
,
A. Gefferth
,
Trang Le Dinh Dang
,
S. Molnár
IEEE GLOBECOM - IEEE Global Telecommunications…
2007
Corpus ID: 13486
Skype uses strong encryption to secure communications inside the whole Skype network. Clients choose communication ports randomly…
Expand
2004
2004
Network security hacks
A. Lockhart
2004
Corpus ID: 5582108
To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent…
Expand
2004
2004
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
Wen-Guey Tzeng
IEEE transactions on computers
2004
Corpus ID: 35629278
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1…
Expand
Review
1990
Review
1990
A short proof for explicit formulas for discrete logarithms in finite fields
H. Niederreiter
Applicable Algebra in Engineering, Communication…
1990
Corpus ID: 206804484
Let Fq be the finite field of order q and characteristic p, so that q is a power of the prime p. Then the multiplicative group F…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE