Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,826 papers from all fields of science
Search
Sign In
Create Free Account
HKDF
HKDF is an HMAC based key derivation function that transforms any weak key material (e.g. Diffie Hellman exchanged shared secrets) into a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Broader (1)
Cryptography
DACS — The Distributed Access Control System
Key derivation function
Salt (cryptography)
WhatsApp Messenger
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Fingerprint Protected Password Authentication Protocol
Chao Yang
,
Junwei Zhang
,
Jingjing Guo
,
Yu Zheng
,
Li Yang
,
Jianfeng Ma
Secur. Commun. Networks
2019
Corpus ID: 195769294
With the rapid development of industrial Internet of things (IIOT), a variety of cloud services have been deployed to store and…
Expand
2019
2019
Algorithm Identifiers for the HMAC-based Extract-and-Expand Key Derivation Function (HKDF)
R. Housley
Request for Comments
2019
Corpus ID: 86657133
RFC 5869 specifies the HMAC-based Extract-and-Expand Key Derivation Function (HKDF) algorithm. This document assigns algorithm…
Expand
2019
2019
Further Analysis of PRNG-Based Key Derivation Functions
J. Mcginthy
,
Alan J. Michaels
IEEE Access
2019
Corpus ID: 199005049
The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked…
Expand
2018
2018
Efficient Anonymous Group Communication
Tim Grube
2018
Corpus ID: 52151503
This dissertation addresses the important challenge of efficiency in anonymous communication. Solving this challenge is essential…
Expand
2018
2018
A Lightweight Authentication and Key Exchange Protocol for IoT
Abdulrahman Bin-Rabiah
,
K. Ramakrishnan
,
Elizabeth Liri
,
K. Kar
2018
Corpus ID: 53404001
— Security in IoT environments is critical, as there are many situations where IoT devices provide sensory information that needs…
Expand
2012
2012
Hybrid Encryption in the Multi-User Setting
Gregory M. Zaverucha
IACR Cryptology ePrint Archive
2012
Corpus ID: 7911251
This paper presents an attack in the multi-user setting on various publickey encryption schemes standardized in IEEE 1363a [20…
Expand
2007
2007
Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys
Xavier Boyen
USENIX Security Symposium
2007
Corpus ID: 14676672
We revisit the venerable question of "pure password"- based key derivation and encryption, and expose security weaknesses in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE