Key generator

A key generator is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. This sequence is used as an… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typically require an error… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2014
2014
Physical unclonable functions (PUFs) are primitives that generate high-entropy, tamper resistant bits for use in secure systems… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 5
Is this relevant?
2014
2014
A smart grid (SG) consists of many subsystems and networks, all working together as a system of systems, many of which are… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2013
2013
In computer forensics, log files are indispensable resources that support auditors in identifying and understanding system… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Strength of cryptographic cipher depends on the statistical performance of its generated key stream. Generation of high quality… (More)
  • figure 1
  • table III
  • table IV
  • table I
  • figure 3
Is this relevant?
2013
2013
Physical Unclonable Function (PUF) is widely known as an effective countermeasure to withstand non-invasive computational attacks… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Hierarchical key management schemes would serve well for military applications where the organization of the network is already… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
In this paper, we propose a new modified version of Advanced Encryption Standard (AES) using chaotic key generator for satellite… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2009
2009
In this paper, we present a wavelet-based 128-bit key generator using electrocardiogram (ECG) signals. The key generator… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?