Skip to search formSkip to main contentSkip to account menu

Key stretching

Known as: Key strengthening, Key extension, Passphrase strengthening 
In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
“EIT waves” are a globally propagating wavelike phenomenon. They were often interpreted as fast-mode magnetoacoustic waves in the… 
2011
2011
Mostly due to the progresses in spatial resolution of satellite imagery, the methods of segment- based image analysis for… 
2011
2011
The effects of the elastic deformation on the mechanical and physical properties of graphene are a subject of intensive current… 
2007
2007
In the past years, precise measurements of time intervals have been realized using methods such as time- stretching, Vernier and… 
Highly Cited
2003
Highly Cited
2003
A lack of power and extensibility in their query languages has seriously limited the generality of DBMSs and hampered their… 
Highly Cited
1993
Highly Cited
1993
Combining the modified Urey–Bradley–Shimanouchi intramolecular potential energy function with an appropriate intermolecular… 
1990
1990
We compiled industry seismic and LTTHOPROBE deep seismic data in the southwestern Gulf of St. Lawrence, and interpreted them… 
Highly Cited
1980
Highly Cited
1980
The origin of the subsidence of Atlantic-type continental margins is of much interest to geology and geophysics. The main problem…