Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,998,349 papers from all fields of science
Search
Sign In
Create Free Account
Key generator
A key generator is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. This sequence is used as an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptography
Encryption
Key generation
Solitaire (cipher)
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Weiran Liu
,
Jianwei Liu
,
Qianhong Wu
,
Bo Qin
,
D. Naccache
,
Houda Ferradi
IACR Cryptology ePrint Archive
2016
Corpus ID: 17460032
With the advances of cloud computing, data sharing becomes easier for large-scale enterprises. When deploying privacy and…
Expand
2015
2015
XOR-Base Secret Sharing Scheme for Image Database Security
MISS. Bhagyashree
,
A. Dhamande
,
S. PROF.SWATI
,
Deshmukh
2015
Corpus ID: 212503587
-This paper emphasize on, how to encrypt image by using XOR Visual cryptography Technique. Here we propose model, which…
Expand
2015
2015
Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Adi Maaita
,
Hamza A. A. AlSewadi
2015
Corpus ID: 42898955
Abstract — One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their…
Expand
2014
2014
39 fJ/bit On-Chip Identification ofWireless Sensors Based on Manufacturing Variation
J. Bolus
,
B. Calhoun
,
T. Blalock
2014
Corpus ID: 14438817
A 39 fJ/bit IC identification system based on FET mismatch is presented and implemented in a 130 nm CMOS process. ID bits are…
Expand
2010
2010
Cryptanalysis of an Efficient Hierarchical Identity Based Signature Scheme in the Standard Model
Xu An Wang
,
Weidong Zhong
,
Haining Luo
International Symposium on Intelligence…
2010
Corpus ID: 16121722
Hierarchical identity based signature generalizes the concept of identity based signature to organization hierarchy. Till now…
Expand
2009
2009
A Block Encryption Scheme Based on 3D Chaotic Arnold Maps
Zhou Zhe
,
Haibing Yang
,
Zhu Yu
,
Wenjie Pan
,
Yunpeng Zhang
International Asia Symposium on Intelligent…
2009
Corpus ID: 16352930
In traditional block cipher, S-box is used in many algorithms while the S-box is kept unchanged, so that the weakness of S-box…
Expand
2008
2008
A Session Key Generator Based on Chaotic Sequence
Chen Zhuo
,
Zhengwen Zhang
,
Jiang Nan
International Conference on Computer Science and…
2008
Corpus ID: 15175537
Key management is a very important part in cryptography. It is related to generation, exchange, storage, safeguarding, use, and…
Expand
2006
2006
Biometric-Iris Random Key Generator Using Generalized Regression Neural Networks
L. Garza-Castañón
,
MariCarmen Pérez Reigosa
,
J. Nolazco-Flores
International Conference on Industrial…
2006
Corpus ID: 42490142
In this work, we present a new approach to generate cryptographic keys from iris biometric. The main challenge of the general…
Expand
2006
2006
Policy-based cryptography : theory and applications
Wohammed Walid Bagga
2006
Corpus ID: 62038900
xix
1991
1991
Problems with Mitchell's Nonlinear Key Generators
D. D. Wheeler
Cryptologia
1991
Corpus ID: 30702617
The key sequences from Mitchell's [3] recently proposed nonlinear key generator show clear patterns when successive differences…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE