Strong cryptography

Known as: Cryptographically strong, Strong encryption, Cryptographic strength 
Strong cryptography or cryptographically strong are general terms applied to cryptographic systems or components that are considered highly resistant… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms. These algorithms and their… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper we try to estimate the real influence of public key cryptography (PKC) to the lifetime of a sensor node in wireless… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2006
2006
The fundamental idea behind this encryption technique is the exploitation of DNA cryptographic strength, such as its storing… (More)
  • figure 1
  • figure 2
  • table A.1
Is this relevant?
2003
2003
In 2.5, strong cryptography has been incorporated into the kernel. This inclusion was a result of several motivating factors… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We have developed a scheme to secure networkattached storage systems against many types of attacks. Our system uses strong… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of… (More)
Is this relevant?
Highly Cited
1991
Highly Cited
1991
We present the first undeniable signature schemes wh re signers are unconditionally secure. In the efficient variants, the… (More)
Is this relevant?
Highly Cited
1983
Highly Cited
1983
This paper shows how to generate from a short random seed a long sequence of pseudorandom numbers which is cryptogrgraphically… (More)
Is this relevant?