Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,286,837 papers from all fields of science
Search
Sign In
Create Free Account
Key stretching
Known as:
Key strengthening
, Key extension
, Passphrase strengthening
Expand
In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
.htpasswd
Argon2
Bcrypt
Block cipher
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
The 2015 Plains Elevated Convection at Night Field Project
B. Geerts
,
D. Parsons
,
+24 authors
J. Wurman
2017
Corpus ID: 55082694
AbstractThe central Great Plains region in North America has a nocturnal maximum in warm-season precipitation. Much of this…
Expand
Highly Cited
2011
Highly Cited
2011
FIRST EVIDENCE OF COEXISTING EIT WAVE AND CORONAL MORETON WAVE FROM SDO/AIA OBSERVATIONS
P. Chen
,
Y. Wu
2011
Corpus ID: 119226087
“EIT waves” are a globally propagating wavelike phenomenon. They were often interpreted as fast-mode magnetoacoustic waves in the…
Expand
Highly Cited
2009
Highly Cited
2009
FPGA implementation of AES encryption and decryption
A. Deshpande
,
M. Deshpande
,
Devendra N. Kayatanavar
International Conference on Control, Automation…
2009
Corpus ID: 46569787
Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that…
Expand
Highly Cited
2006
Highly Cited
2006
An Atomistic-to-Continuum Framework for Nonlinear Crystal Mechanics Based on Asymptotic Homogenization
J. Clayton
,
P. Chung
2006
Corpus ID: 55165129
Highly Cited
2005
Highly Cited
2005
Volcanic passive margins
L. Geoffroy
2005
Corpus ID: 55890914
Highly Cited
2000
Highly Cited
2000
Dynamics of weakly strain-hardening fluids in filament stretching devices
M. Yao
,
S. Spiegelberg
,
G. McKinley
2000
Corpus ID: 18199915
Highly Cited
1999
Highly Cited
1999
Persistent patterns in transient chaotic fluid mixing
D. Rothstein
,
E. Henry
,
J. Gollub
,
J. Gollub
Nature
1999
Corpus ID: 4384393
Chaotic advection of a fluid can cause an initially inhomogeneous impurity (a passive scalar field) to develop complex spatial…
Expand
Highly Cited
1993
Highly Cited
1993
Structure of the Dead Sea Pull-Apart Basin From Gravity Analyses
U. Brink
,
Z. Ben‐Avraham
,
+5 authors
B. Coakley
1993
Corpus ID: 51692594
Analyses and modeling of gravity data in the Dead Sea pull-apart basin reveal the geometry of the basin and constrain models for…
Expand
1987
1987
Synthesis of the tectonic and sedimentological evolution of the late Proterozoic-early Cambrian Hedmark Basin, the Caledonian Thrust Belt, southern Norway
J. P. Nystuen
1987
Corpus ID: 55422359
The Hedmark Basin was formed by rifting c. 750-590 Ma ago in an area about 130-230 km NW of the present position of the basinal…
Expand
Highly Cited
1986
Highly Cited
1986
THE OKINAWA TROUGH: GENESIS OF A BACK-ARC BASIN DEVELOPING ALONG A CONTINENTAL MARGIN
J. Letouzey
,
M. Kimura
1986
Corpus ID: 67817476
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE