Skip to search formSkip to main contentSkip to account menu

Strong secrecy

Known as: Strong secret, Weak secrecy, Weak secret 
Strong secrecy is a term used in formal proof-based cryptography for making propositions about the security of cryptographic protocols. It is a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
The problem of secret-key based authentication under privacy and storage constraints on the source sequence is considered. The… 
Review
2018
Review
2018
We present an overview of recent advances in the Area of information security using algebraic number fields. This overview… 
2015
2015
Today, the security of digital images is considered more and more essential and a strong secret key plays a major role in the… 
2015
2015
The proposed encryption algorithm is composed of two parts, permutation and diffusion. we firstly separate the RGB image into R… 
2014
2014
We develop a low-complexity and secrecy capacity achieving polar coding scheme for the discrete memoryless wiretap channel. Our… 
2014
2014
We study ballot independence for election schemes. First, we formally define ballot independence as a cryptographic game and… 
2014
2014
Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to… 
2014
2014
In a system that performs both encryption and lossy compression, the conventional way is to compress first and then encrypt the… 
2009
2009
The Trusted Platform Module (TPM) is a hardware chip designed to enable PCs achieve greater security. Proof of possession of…