Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,325 papers from all fields of science
Search
Sign In
Create Free Account
Key space (cryptography)
Known as:
Key space
In cryptography, an algorithm's key space refers to the set of all possible permutations of a keys.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
56-bit encryption
Algorithm
Brute-force attack
Byte
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Dr. Sattar B. Sadkhan
,
Dhilal M. Reda
Al-Mansour International Conference on New Trends…
2018
Corpus ID: 96432267
One of the most important strength features of crypto-system’s is the key space. As a result, whenever the system has more key…
Expand
2017
2017
Performance-Improved Secure OFDM Transmission Using Chaotic Active Constellation Extension
J. Zhong
,
Xuelin Yang
,
Weisheng Hu
IEEE Photonics Technology Letters
2017
Corpus ID: 29350720
We propose and demonstrate a physical-layer security scheme using chaotic active constellation extension (ACE) in orthogonal…
Expand
Highly Cited
2014
Highly Cited
2014
Improvement of the Security of ZigBee by a New Chaotic Algorithm
B. Bakhache
,
Joseph M. Ghazal
,
S. E. Assad
IEEE Systems Journal
2014
Corpus ID: 23134073
The security protocols used in ZigBee rely on an advanced encryption standard-counter mode (AES-CTR) algorithm to encrypt data…
Expand
2011
2011
An Image Encryption Scheme Based on Modified Logistic Map
Yue Sun
,
Guangyi Wang
Fourth International Workshop on Chaos-Fractals…
2011
Corpus ID: 15470049
In order to improve the security of chaotic encryption algorithm, a modified chaotic map, which is based on the Logistic map, is…
Expand
2011
2011
A Novel Color Image Encryption Algorithm Based on Chaotic Maps
Huibin Lu
,
Xia Xiao
2011
Corpus ID: 14861228
Due to the character of higher security of three-dimensional chaotic systems, a new algorithm based on Chen and Lorenz systems is…
Expand
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
2010
2010
An effective key distribution protocol for secure multicast communication
P. Vijayakumar
,
S. Bose
,
A. Kannan
,
S. Subramanian
International Conference on Advanced Computing
2010
Corpus ID: 6443487
Multicast is an important communication method used in many emerging multimedia networking applications. Providing efficient…
Expand
2010
2010
Improving for chaotic image encryption algorithm based on logistic map
Ai-hong Zhu
,
Lian Li
The 2nd Conference on Environmental Science and…
2010
Corpus ID: 17581629
Encryption technology is an important measure to ensure the security of digital image, this paper's main purpose is to research…
Expand
2009
2009
An Encryption Algorithm Based on Transformed Logistic Map
Jianquan Xie
,
Chunhua Yang
,
Qing Xie
,
Lijun Tian
International Conference on Networks Security…
2009
Corpus ID: 17947065
Security issues which exist while sequences produced by Logistic chaotic map used in encryption is analyzed. Moreover, an…
Expand
Highly Cited
2008
Highly Cited
2008
Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation
Xiangdong Liu
,
Junxing Zhang
,
Jinhai Zhang
,
He Xiqin
2008
Corpus ID: 14419123
†Summary This paper proposed a novel image scrambling scheme based on chaos theory and the sorting transformation. The new…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE