Skip to search formSkip to main contentSkip to account menu

Key stretching

Known as: Key strengthening, Key extension, Passphrase strengthening 
In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
AbstractThe central Great Plains region in North America has a nocturnal maximum in warm-season precipitation. Much of this… 
Highly Cited
2011
Highly Cited
2011
“EIT waves” are a globally propagating wavelike phenomenon. They were often interpreted as fast-mode magnetoacoustic waves in the… 
Highly Cited
2009
Highly Cited
2009
Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that… 
Highly Cited
2005
Highly Cited
2005
Highly Cited
1999
Highly Cited
1999
Chaotic advection of a fluid can cause an initially inhomogeneous impurity (a passive scalar field) to develop complex spatial… 
Highly Cited
1993
Highly Cited
1993
Analyses and modeling of gravity data in the Dead Sea pull-apart basin reveal the geometry of the basin and constrain models for… 
1987
1987
The Hedmark Basin was formed by rifting c. 750-590 Ma ago in an area about 130-230 km NW of the present position of the basinal…