Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,641,710 papers from all fields of science
Search
Sign In
Create Free Account
Device Keys
Device Keys play a roles in the cryptographic key management procedure in the Advanced Access Content System (AACS) specification. This specification…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
5 relations
AACS encryption key controversy
Digital rights management
Encrypted Title Key
Media Key Block
Broader (1)
Advanced Access Content System
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Session Key Derivation for Low Power IoT Devices
J. Mcginthy
,
Alan J. Michaels
IEEE 4th International Conference on Big Data…
2018
Corpus ID: 54434750
The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked…
Expand
2018
2018
DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu
,
M. Ryan
,
C. Cremers
IEEE Transactions on Information Forensics and…
2018
Corpus ID: 5490230
We present DECIM, an approach to solve the challenge of detecting endpoint compromise in messaging. DECIM manages and refreshes…
Expand
2015
2015
How to detect unauthorised usage of a key
Jiangshan Yu
,
M. Ryan
,
C. Cremers
IACR Cryptol. ePrint Arch.
2015
Corpus ID: 12942157
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device…
Expand
2009
2009
Breaking KeeLoq in a Flash ⋆ -
Markus Kasper
,
Timo Kasper
,
A. Moradi
,
C. Paar
2009
Corpus ID: 15676759
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the…
Expand
2008
2008
A Fundamentally Secure Payment Device Interfaced to Regular PCs
A. Bouhraoua
,
M. Al-Shammari
IEEE Region 5 Conference
2008
Corpus ID: 12919315
The present contribution introduces a new way for solving the issue of security for payments over the internet. It particularly…
Expand
2008
2008
Physical Cryptanalysis of KeeLoq Code Hopping Applications
T. Eisenbarth
,
Timo Kasper
,
A. Moradi
,
C. Paar
,
M. Salmasizadeh
,
M. Shalmani
IACR Cryptol. ePrint Arch.
2008
Corpus ID: 16367373
KeeLoq remote keyless entry systems are widely used for access control purposes such as garage door openers or car anti-theft…
Expand
2006
2006
12 – Broadcast Encryption
J. Lotspiech
2006
Corpus ID: 59825028
Review
2004
Review
2004
Key-assignment strategies for CPPM
André Adelsbach
,
Jörg Schwenk
MM&Sec '04
2004
Corpus ID: 10687512
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and…
Expand
2001
2001
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Scott A. Crosby
,
I. Goldberg
,
Robert T. Johnson
,
D. Song
,
D. Wagner
Digital Rights Management Workshop
2001
Corpus ID: 2687563
We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCPi…
Expand
1996
1996
Device keys having a key curves
Arnaud Flegeo
,
Michael Sauvage
1996
Corpus ID: 132144795
This device comprises a curved keypad with a certain profile, comprising: on the outside, keys (6c, 6f and 6i) to be handled by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE