Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,838 papers from all fields of science
Search
Sign In
Create Free Account
Device Keys
Device Keys play a roles in the cryptographic key management procedure in the Advanced Access Content System (AACS) specification. This specification…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
AACS encryption key controversy
Digital rights management
Encrypted Title Key
Media Key Block
Broader (1)
Advanced Access Content System
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Mitigating private key compromise
Jiangshan Yu
2016
Corpus ID: 26338396
Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this…
Expand
2015
2015
How to detect unauthorised usage of a key
Jiangshan Yu
,
M. Ryan
,
Cas J. F. Cremers
IACR Cryptology ePrint Archive
2015
Corpus ID: 12942157
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device…
Expand
2013
2013
Device authentication using physically unclonable function based key generation system
P·克贝勒
2013
Corpus ID: 195954616
The present invention discloses a device authentication using a physically unclonable function based key generation system. At…
Expand
2011
2011
A modified method for storage and revoking of the AACS device keys
Yang Hui
2011
Corpus ID: 123280743
The advanced access content system is a standard for content distribution and digital rights management.It revokes compromised…
Expand
2009
2009
Breaking KeeLoq in a Flash ⋆ -
Markus Kasper
,
Timo Kasper
,
A. Moradi
,
C. Paar
2009
Corpus ID: 15676759
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the…
Expand
2008
2008
Method of tracing device keys for broadcast encryption
김진목
,
윤영선
,
이선남
,
이충훈
,
주학수
2008
Corpus ID: 108310599
PURPOSE: A method of tracing device keys for a broadcast encryption is provided to prevent exposure of a device key through…
Expand
2008
2008
A Fundamentally Secure Payment Device Interfaced to Regular PCs
A. Bouhraoua
,
M. Al-Shammari
IEEE Region 5 Conference
2008
Corpus ID: 12919315
The present contribution introduces a new way for solving the issue of security for payments over the internet. It particularly…
Expand
2008
2008
Secure Group communication in Body Area Networks
Yu Cai
,
Jindong Tan
International Conference on Informatics and…
2008
Corpus ID: 16920598
Body area network (BAN) is an emerging technology which receives significant interest recent years. Typical BAN applications…
Expand
Review
2004
Review
2004
Key-assignment strategies for CPPM
André Adelsbach
,
Jörg Schwenk
Workshop on Multimedia & Security
2004
Corpus ID: 10687512
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and…
Expand
1996
1996
Device keys having a key curves
Arnaud Flegeo
,
Michael Sauvage
1996
Corpus ID: 132144795
This device comprises a curved keypad with a certain profile, comprising: on the outside, keys (6c, 6f and 6i) to be handled by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE