Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,200,724 papers from all fields of science
Search
Sign In
Create Free Account
Key Wrap
Known as:
AESKW
, Nist key wrap
Key Wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Authenticated encryption
Block cipher
Cryptographic hash function
Deterministic encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application
S. J. H. Pirzada
,
A. Murtaza
,
Tongge Xu
,
Jianwei Liu
IEEE Access
2020
Corpus ID: 214595826
High-speed data communication is becoming essential for many applications, including satellite communication. The security…
Expand
2020
2020
Zone Encryption with Anonymous Authentication for V2V Communication
J. Camenisch
,
Manu Drijvers
,
Anja Lehmann
,
G. Neven
,
Patrick Towa
European Symposium on Security and Privacy
2020
Corpus ID: 210707121
Vehicle-to-vehicle (V2V) communication systems are currently being prepared for real-world deployment, but they face strong…
Expand
2016
2016
Analysis of Key Wrapping APIs: Generic Policies, Computational Security
Guillaume Scerri
,
Ryan Stanley-Oakes
IEEE Computer Security Foundations Symposium
2016
Corpus ID: 8285148
We present an analysis of key wrapping APIs with generic policies. We prove that certain minimal conditions on policies are…
Expand
2016
2016
Cryptographic Key Protection in a Cryptoprocessor
N. Rajitha
,
R. Sridevi
2016
Corpus ID: 59165905
2014
2014
Key Wrapping with a Fixed Permutation
D. Khovratovich
The Cryptographer's Track at RSA Conference
2014
Corpus ID: 15017801
We present an efficient key wrapping scheme that uses a single public permutation as the basic element. As the scheme does not…
Expand
2009
2009
More on Key Wrapping
R. Gennaro
,
S. Halevi
IACR Cryptology ePrint Archive
2009
Corpus ID: 27689591
We address the practice of key-wrapping, where one symmetric cryptographic key is used to encrypt another. This practice is used…
Expand
2008
2008
Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES)
D. Harkins
Request for Comments
2008
Corpus ID: 5619878
This memo describes SIV, a block cipher mode of operation. SIV takes a key, a plaintext, and multiple variable-length octet…
Expand
Review
2004
Review
2004
Request for Review of Key Wrap Algorithms
M. Dworkin
IACR Cryptology ePrint Archive
2004
Corpus ID: 30270525
The following document contains excerpts from draft standard of the Accredited Standards Committee, X9, Inc. (ASC X9) entitled…
Expand
Highly Cited
2002
Highly Cited
2002
Advanced Encryption Standard (AES) Key Wrap Algorithm
J. Schaad
,
R. Housley
Request for Comments
2002
Corpus ID: 26164460
The purpose of this document is to make the Advanced Encryption Standard (AES) Key Wrap algorithm conveniently available to the…
Expand
2001
2001
Triple-DES and RC2 Key Wrapping
R. Housley
Request for Comments
2001
Corpus ID: 45388047
This document specifies the algorithm for wrapping one Triple-DES key with another Triple-DES key and the algorithm for wrapping…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE