Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,668,098 papers from all fields of science
Search
Sign In
Create Free Account
Strong secrecy
Known as:
Strong secret
, Weak secrecy
, Weak secret
Strong secrecy is a term used in formal proof-based cryptography for making propositions about the security of cryptographic protocols. It is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Algorithm
Cryptographic protocol
Cryptography
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
O. Günlü
,
Rafael F. Schaefer
,
H. Poor
International Symposium on Information Theory
2020
Corpus ID: 209832522
The problem of secret-key based authentication under privacy and storage constraints on the source sequence is considered. The…
Expand
Review
2018
Review
2018
Modular Construction a Lattices from Cyclotomic Fields and their Applications in Information Security
Hassan Khodaiemehr
,
D. Panario
,
Mohammad-Reza Sadeghi
15th International ISC (Iranian Society of…
2018
Corpus ID: 54443438
We present an overview of recent advances in the Area of information security using algebraic number fields. This overview…
Expand
2015
2015
A Novel Dynamic Secret Key Generation for an Efficient Image Encryption Algorithm
L. M. Jawad
,
G. Sulong
2015
Corpus ID: 55768025
Today, the security of digital images is considered more and more essential and a strong secret key plays a major role in the…
Expand
2015
2015
A RGB image encryption algorithm based on DNA sequence operation and hyper-chaotic system
Abolfazl Yaghouti Niyat
,
Reza Mohammad Hei Hei
,
M. V. Jahan
2015
Corpus ID: 38608161
The proposed encryption algorithm is composed of two parts, permutation and diffusion. we firstly separate the RGB image into R…
Expand
2015
2015
Biometric Knowledge Extraction for Multi-factor Authentication and Key Exchange
Phillip H. Griffin
Complex Adaptive Systems
2015
Corpus ID: 19368705
2014
2014
Polar coding for the broadcast channel with confidential messages
Rémi A. Chou
,
M. Bloch
Information Theory Workshop
2014
Corpus ID: 3025075
We develop a low-complexity and secrecy capacity achieving polar coding scheme for the discrete memoryless wiretap channel. Our…
Expand
2014
2014
Ballot secrecy and ballot independence: definitions and relations
B. Smyth
,
D. Bernhard
2014
Corpus ID: 7599940
We study ballot independence for election schemes. First, we formally define ballot independence as a cryptographic game and…
Expand
2014
2014
Polar coding for the general wiretap channel
Yi-Peng Wei
,
S. Ulukus
Information Theory Workshop
2014
Corpus ID: 5107954
Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to…
Expand
2014
2014
Compressing Encrypted Data and Permutation Cipher
Wei Kang
,
Nan Liu
arXiv.org
2014
Corpus ID: 15419965
In a system that performs both encryption and lossy compression, the conventional way is to compress first and then encrypt the…
Expand
2009
2009
Offline dictionary attack on TCG TPM weak authorisation data, and solution
Liqun Chen
,
M. Ryan
2009
Corpus ID: 18063987
The Trusted Platform Module (TPM) is a hardware chip designed to enable PCs achieve greater security. Proof of possession of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE