Skip to search formSkip to main contentSkip to account menu

Static key

A cryptographic key is called static if it is intended for use for a relatively long period of time and is typically intended for use in many… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The basic Supersingular Isogeny Diffie-Hellman (SIDH) key agreement protocol is insecure due to an attack described by Galbraith… 
2017
2017
  • 2017
  • Corpus ID: 267865840
This paper, and its associated presentation, represents a capstone to previous years’ work by the author on the subject of… 
2016
2016
Content Based Video Retrieval (CBVR) system anxieties with the presentation of video segmentation technique for the retrieval of… 
2016
2016
ing Cryptographic 
Review
2016
Review
2016
In Today’s electronic era, we have a cheap storage device that’s why the amount of digital data produced and added in the… 
2015
2015
With the rapid development of wireless communication technology, wireless community has brought a lot of convenience to people's… 
Review
2015
Review
2015
This paper presents a survey on efficient hashing techniques in software configuration management scenarios. Therefore it… 
2014
2014
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum… 
2014
2014
Many RFID authentication protocols have been proposed for safe drug administration. Unfortunately, many of the proposed protocols… 
2004
2004
Over the past decades, distributed computing has been gaining popularity. It provides more computing power and memory space for…