Key generation

Key generation is the process of generating keys in cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted. A… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The broadcast nature of a wireless link provides a natural eavesdropping and intervention capability to an adversary. Thus… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Instead of using PINs and passwords as cryptographic keys that are either easy to forget or vulnerable to dictionary attacks… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Among the various computer security techniques practice today, cryptography has been identified as one of the most important… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
n recent years, public key infrastructure (PKI) has emerged as co-existent with the increasing demand for digital security. A… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We propose a technique to reliably generate a cryptographic key from a user’s voice while speaking a password. The key resists… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We present a protocol for two parties to generate an RSA key in a distributed manner. At the end of the protocol the public key… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In this paper, we introduce a collection of cryptographic key constructions built from environmental data that are resistant to… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and… (More)
  • figure 1
  • figure 2
Is this relevant?