Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,058,994 papers from all fields of science
Search
Sign In
Create Free Account
Key Wrap
Known as:
AESKW
, Nist key wrap
Key Wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Authenticated encryption
Block cipher
Cryptographic hash function
Deterministic encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
S. Shinichi
IACR Cryptology ePrint Archive
2020
Corpus ID: 210876409
ARX-KW is a family of key wrapping construction based on add-rotate-xor primitives: the pseudo-random function SipHash for…
Expand
2016
2016
Cryptographic Key Protection in a Cryptoprocessor
N. Rajitha
,
R. Sridevi
2016
Corpus ID: 59165905
2014
2014
Development of integrated mobile money system using Near Field Communication (NFC)
E. Husni
,
Adrian Ariono
International Conference on Telecommunication…
2014
Corpus ID: 14644725
Nowadays smartphone is widely used in every part of the world. Trend that is happening now is mobile phone penetration tends to…
Expand
2012
2012
Further More on Key Wrapping
Yasushi Osaki
,
Tetsu Iwata
IEICE Transactions on Fundamentals of Electronics…
2012
Corpus ID: 7991610
Constructing a secure and efficient key wrapping scheme is demanding, and the scheme based on a universal hash function and an…
Expand
2011
2011
Protocol for Carrying Authentication for Network Access (PANA) Extension for Key Wrap
R. Cragie
,
Paul Duffy
,
A. Yegin
,
Y. Ohba
2011
Corpus ID: 262708815
This document specifies an extension to PANA (Protocol for carrying Authentication for Network Access) for secure delivery of…
Expand
2011
2011
Security of Hash-then-CBC Key Wrapping Revisited
Yasushi Osaki
,
Tetsu Iwata
IMA Conference on Cryptography and Coding
2011
Corpus ID: 34102725
Key wrapping schemes are used to encrypt data of high entropy, such as cryptographic keys. There are two known security…
Expand
2010
2010
A Variable Length Data Encryption Technique using Square Grid Transposition with Key Wrapping
A. A. Rao
,
Dr. M. Shashi
,
+4 authors
A. Pradesh
2010
Corpus ID: 61494917
†† ††† †††† ††† †††† Summary This paper has a new approach for encryption of various file formats like text, image, audio and…
Expand
2007
2007
A Design of AES-based Key Wrap/Unwrap Core for WiBro Security
Jong-Hwan Kim
,
H. Jeon
,
K. Shin
2007
Corpus ID: 60002986
This paper describes an efficient hardware design of key wrap/unwrap algorithm for security layer of WiBro system. The key wrap…
Expand
2005
2005
Certicom Proposal to Revise SEC 1 : Elliptic Curve Cryptography , Version 1 . 0 Prepared by
Daniel R. L. Brown
2005
Corpus ID: 14139941
The Standard for Efficient Cryptography (SEC) 1, Elliptic Curve Cryptography (ECC), Version 1.0 [23] is a freely available…
Expand
2001
2001
Triple-DES and RC2 Key Wrapping
R. Housley
Request for Comments
2001
Corpus ID: 45388047
This document specifies the algorithm for wrapping one Triple-DES key with another Triple-DES key and the algorithm for wrapping…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE