Key size

Known as: Cryptography/key length, 128 bit encryption, Key length 
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We analyze the concrete security and key sizes of theoretically sound lattice-based encryption schemes based on the “learning… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 8
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security… (More)
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
k-times anonymous authentication (k-TAA) schemes allow members of a group to be authenticated anonymously by application… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any… (More)
Is this relevant?
2003
2003
Executive Summary The popular 1024-bit key size for RSA keys is becoming the next horizon for researchers in inte factorization… (More)
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The IEEE 802.11 standard [1] defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. The goal of WEP… (More)
Is this relevant?