Skip to search formSkip to main contentSkip to account menu

Key generator

A key generator is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. This sequence is used as an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
With the advances of cloud computing, data sharing becomes easier for large-scale enterprises. When deploying privacy and… 
2015
2015
-This paper emphasize on, how to encrypt image by using XOR Visual cryptography Technique. Here we propose model, which… 
2015
2015
 Abstract — One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their… 
2014
2014
A 39 fJ/bit IC identification system based on FET mismatch is presented and implemented in a 130 nm CMOS process. ID bits are… 
2010
2010
Hierarchical identity based signature generalizes the concept of identity based signature to organization hierarchy. Till now… 
2009
2009
In traditional block cipher, S-box is used in many algorithms while the S-box is kept unchanged, so that the weakness of S-box… 
2008
2008
Key management is a very important part in cryptography. It is related to generation, exchange, storage, safeguarding, use, and… 
2006
2006
In this work, we present a new approach to generate cryptographic keys from iris biometric. The main challenge of the general… 
1991
1991
The key sequences from Mitchell's [3] recently proposed nonlinear key generator show clear patterns when successive differences…