Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Device Keys

Device Keys play a roles in the cryptographic key management procedure in the Advanced Access Content System (AACS) specification. This specification… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We present DECIM, an approach to solve the challenge of detecting endpoint compromise in messaging. DECIM manages and refreshes… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
2018
2018
The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
2015
2015
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table 1
Highly Cited
2012
Highly Cited
2012
This paper presents an easy to design Physically Unclonable Function (PUF). The proposed PUF implementation is a loop composed of… Expand
  • figure 3
  • figure 2
  • figure 5
  • figure 6
  • figure 7
2009
2009
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2008
2008
The present contribution introduces a new way for solving the issue of security for payments over the internet. It particularly… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2008
2008
KeeLoq remote keyless entry systems are widely used for access control purposes such as garage door openers or car anti-theft… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
2008
2008
PURPOSE: A method of tracing device keys for a broadcast encryption is provided to prevent exposure of a device key through… Expand
2001
2001
We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCPi… Expand
  • table 1
  • table 2
1996
1996
This device comprises a curved keypad with a certain profile, comprising: on the outside, keys (6c, 6f and 6i) to be handled by… Expand