Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,755,884 papers from all fields of science
Search
Sign In
Create Free Account
Key generator
A key generator is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. This sequence is used as an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptography
Encryption
Key generation
Solitaire (cipher)
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Haider M. Al-Mashhadi
,
I. Q. Abduljaleel
International Conference on Communications and…
2017
Corpus ID: 23484633
Applying security to the transmitted image is very important issues, because the transmission channel is open and can be…
Expand
2017
2017
Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
Fabrice Benhamouda
,
Houda Ferradi
,
R. Géraud
,
D. Naccache
European Symposium on Research in Computer…
2017
Corpus ID: 33150725
RSA public keys are central to many cryptographic applications; hence their validity is of primary concern to the scrupulous…
Expand
2016
2016
Secure scan chain using test port for tester authentication
Yahia Ouahab
,
D. Richard
,
R. Rashidzadeh
International Conference on Electronics, Circuits…
2016
Corpus ID: 8605537
Design-for-Test (DFT) techniques have been developed to improve testability of integrated circuits. Among the known DFT…
Expand
2016
2016
A new event-driven Dynamic Vision Sensor based Physical Unclonable Function for camera authentication in reactive monitoring system
Yue Zheng
,
Yuan Cao
,
Chip-Hong Chang
Asian Hardware-Oriented Security and Trust…
2016
Corpus ID: 17655362
Surveillance footage has become an integral part of law enforcement as video cameras become ubiquitous, affordable and more…
Expand
2015
2015
Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Adi Maaita
,
Hamza A. A. AlSewadi
2015
Corpus ID: 42898955
Abstract — One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their…
Expand
2014
2014
39 fJ/bit On-Chip Identification ofWireless Sensors Based on Manufacturing Variation
J. Bolus
,
B. Calhoun
,
T. Blalock
2014
Corpus ID: 14438817
A 39 fJ/bit IC identification system based on FET mismatch is presented and implemented in a 130 nm CMOS process. ID bits are…
Expand
2010
2010
Cryptanalysis of an Efficient Hierarchical Identity Based Signature Scheme in the Standard Model
Xu An Wang
,
Weidong Zhong
,
Haining Luo
International Symposium on Intelligence…
2010
Corpus ID: 16121722
Hierarchical identity based signature generalizes the concept of identity based signature to organization hierarchy. Till now…
Expand
2009
2009
Design of DL-based certificateless digital signatures
L. Harn
,
Jian Ren
,
Changlu Lin
Journal of Systems and Software
2009
Corpus ID: 15549896
2008
2008
A Session Key Generator Based on Chaotic Sequence
Chen Zhuo
,
Zhengwen Zhang
,
Jiang Nan
International Conference on Computer Science and…
2008
Corpus ID: 15175537
Key management is a very important part in cryptography. It is related to generation, exchange, storage, safeguarding, use, and…
Expand
2006
2006
Biometric-Iris Random Key Generator Using Generalized Regression Neural Networks
L. Garza-Castañón
,
MariCarmen Pérez Reigosa
,
J. Nolazco-Flores
International Conference on Industrial…
2006
Corpus ID: 42490142
In this work, we present a new approach to generate cryptographic keys from iris biometric. The main challenge of the general…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE