Skip to search formSkip to main contentSkip to account menu

Key generator

A key generator is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. This sequence is used as an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Applying security to the transmitted image is very important issues, because the transmission channel is open and can be… 
2017
2017
RSA public keys are central to many cryptographic applications; hence their validity is of primary concern to the scrupulous… 
2016
2016
Design-for-Test (DFT) techniques have been developed to improve testability of integrated circuits. Among the known DFT… 
2016
2016
Surveillance footage has become an integral part of law enforcement as video cameras become ubiquitous, affordable and more… 
2015
2015
 Abstract — One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their… 
2014
2014
A 39 fJ/bit IC identification system based on FET mismatch is presented and implemented in a 130 nm CMOS process. ID bits are… 
2010
2010
Hierarchical identity based signature generalizes the concept of identity based signature to organization hierarchy. Till now… 
2008
2008
Key management is a very important part in cryptography. It is related to generation, exchange, storage, safeguarding, use, and… 
2006
2006
In this work, we present a new approach to generate cryptographic keys from iris biometric. The main challenge of the general…