Key stretching

Known as: Key strengthening, Key extension, Passphrase strengthening 
In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
By exploring different granularities of data-level and task-level parallelism, we map 16 implementations of an Advanced… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Mostly due to the progresses in spatial resolution of satellite imagery, the methods of segmentbased image analysis for… (More)
Is this relevant?
2009
2009
Brand extension value is the part of brand value that derives from a brand owner’s right to introduce new products related to the… (More)
  • figure 1
  • table 1
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Secure communication over public networks like the Internet requires the use of cryptographic algorithms as basic building blocks… (More)
  • figure 2
  • figure 4
  • figure 5
  • table 1
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper presents novel high-speed architectures for the hardware implementation of the Advanced Encryption Standard (AES… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This article presents a highly regular and scalable AES hardware architecture, suited for full-custom as well as for semicustom… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
 
Is this relevant?
Highly Cited
1998
Highly Cited
1998
We propose in this paper a public key watermarking algorithm for image integrity veri cation. This watermark is capable of… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity… (More)
Is this relevant?
1997
1997
The Kernighan/Lin graph partitioning heuristic, also known as min-cut or group migration, has been extended over several decades… (More)
  • figure 1
  • figure 2
  • figure 6
  • figure 7
  • figure 8
Is this relevant?