Key derivation function

Known as: KDF, Password hashing, Password-based Key Derivation Function 
In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
M3lcrypt (canonical M3lcryptH) is a password based key derivation function built around the Merkle-Damgard hash function H. It… (More)
  • figure 1
Is this relevant?
2013
2013
A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. This paper… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2013
2013
In various versions of WINRAR, the file security is mainly protected by user authentication and files encryption. Password based… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 9
  • table I
Is this relevant?
2013
2013
We revisit the classical problem of converting an imperfect source of randomness into a usable cryptographic key. Assume that we… (More)
Is this relevant?
2012
2012
In Microsoft Office, the file security is mainly protected by user authentication and files encryption. The cryptographic keys… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table I
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In spite of the central role of key derivation functions (KDF) in applied cryptography, there has been little formal work… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key… (More)
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Executive Summary Skein is a new family of cryptographic hash functions. Its design combines speed, security, simplicity , and a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2005
2005
The growth of the Internet inspires lots of new network applications, and many of them are based on group communication models… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
derivation is consistent with the notion of abstract graph, i.e., any abstract derivation should start from an abstract graph and… (More)
  • figure 12
  • figure 13
Is this relevant?