Skip to search formSkip to main contentSkip to account menu

Static key

A cryptographic key is called static if it is intended for use for a relatively long period of time and is typically intended for use in many… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
  • 2017
  • Corpus ID: 267865840
This paper, and its associated presentation, represents a capstone to previous years’ work by the author on the subject of… 
2016
2016
ing Cryptographic 
Review
2015
Review
2015
This paper presents a survey on efficient hashing techniques in software configuration management scenarios. Therefore it… 
2014
2014
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum… 
2014
2014
Many RFID authentication protocols have been proposed for safe drug administration. Unfortunately, many of the proposed protocols… 
2013
2013
To effectively encrypt data memory contents of an embedded processor, multiple keys which are dynamically changed are necessary… 
2010
2010
A major drawback of implementing Database-as-a-Service (DaaS) on untrusted servers is the complexity of key management required… 
2009
2009
Traditional paper documents are not likely to disappear in the near future as they are present everywhere in daily life, however… 
1975
1975
In this paper procedures are studied for storing, accessing, updating, and reorganizing data in large files whose organization is…