Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Key size
Known as:
Cryptography/key length
, 128 bit encryption
, Key length
Expand
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
128-bit
256-bit
40-bit encryption
56-bit encryption
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags
Cédric Hocquet
,
D. Kamel
,
+4 authors
François-Xavier Standaert
Journal of Cryptographic Engineering
2011
Corpus ID: 18602523
An important challenge associated with the current massive deployment of Radio Frequency Identification solutions is to provide…
Expand
2010
2010
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
M. Nikooghadam
,
A. Zakerolhosseini
,
M. Moghaddam
Journal of Systems and Software
2010
Corpus ID: 41893066
2010
2010
Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations
G. Gódor
,
Norbert Giczi
,
S. Imre
IEEE International Conference on Wireless…
2010
Corpus ID: 17134780
RFID technology can be found in the most fields of our daily life, e.g. personal identification, supply-chain management, access…
Expand
2009
2009
An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems
Hung-Min Sun
,
M. Leu
IEEE transactions on multimedia
2009
Corpus ID: 18339721
In a mobile pay-TV system, a large number of messages are exchanged for mutual authentication purposes. In traditional…
Expand
Highly Cited
2008
Highly Cited
2008
WG: A family of stream ciphers with designed randomness properties
Yassir Nawaz
,
G. Gong
Information Sciences
2008
Corpus ID: 21817972
Highly Cited
2004
Highly Cited
2004
Better Privacy for Trusted Computing Platforms: (Extended Abstract)
J. Camenisch
European Symposium on Research in Computer…
2004
Corpus ID: 15701256
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a…
Expand
2003
2003
A 2.3Gb/s fully integrated and synthesizable AES Rijndael core
N. Kim
,
T. Mudge
,
Richard B. Brown
Proceedings of the IEEE Custom Integrated…
2003
Corpus ID: 16313237
The growth of the Internet as a vehicle for secure communication and electronic commerce has brought cryptographic processing…
Expand
1997
1997
The SPEED Cipher
Yuliang Zheng
Financial Cryptography
1997
Corpus ID: 15341893
SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext…
Expand
1997
1997
Reinterpreting Menopause : Cultural and Philosophical Issues
P. Komesaroff
,
Philipa Rothfield
,
J. Daly
1997
Corpus ID: 141540576
Reinterpreting Menopause brings together a number of reflections from a broad range of areas including feminism, cultural studies…
Expand
1997
1997
On the quantitative specification of jitter constrained periodic streams
Claude-Joachim Hamann
Proceedings Fifth International Symposium on…
1997
Corpus ID: 18862745
An increasing number of application systems can be characterized by their requirement to process sequences of events in real-time…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE