Key (cryptography)

Known as: Encryption key, Cryptographic key, Key (cryptology) 
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We study the design of cryptographic primitives resistant t o a large class of side-channel attacks, called “memory attacks… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible… (More)
  • table 1
  • table 2
  • table 3
  • figure 2
  • table 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 8
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Franciszek Seredynski *, Pascal Bouvry , Albert Y. Zomaya d a Polish–Japanese Institute of Information Technologies, Koszykowa 86… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We present a fast MPEG video encryption algorithm called RVEA which encrypts selected sign bits of the DCT coeecients and motion… (More)
  • figure 4
  • figure 3
  • figure 5
  • figure 8
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Classical cryptographic protocols based on user chosen keys allow an attacker to mount password guessing attacks We introduce a… (More)
Is this relevant?
Highly Cited
1991
Highly Cited
1991
An identity-based non-interactive public key distribution system is presented that is based on a novel trapdoor one-way function… (More)
Is this relevant?