ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
On Security of Key Derivation Functions in Password-based Cryptography
Mapping Intimacies
◽
10.1109/csr51186.2021.9527961
◽
2021
◽
Author(s):
Gaurav Kodwani
◽
Shashank Arora
◽
Pradeep K. Atrey
Keyword(s):
Key Derivation
Download Full-text
Related Documents
Cited By
References
Minimal key set of binary key-derivation tree in cloud storage
Soft Computing
◽
10.1007/s00500-021-06065-w
◽
2021
◽
Author(s):
Zhengwei Ren
◽
Xiaojuan Li
◽
Lina Wang
◽
Shiwei Xu
◽
Yan Tong
◽
...
Keyword(s):
Cloud Storage
◽
Derivation Tree
◽
Key Derivation
Download Full-text
Efficient Group Key Management Protocol with One-Way Key Derivation
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.61
◽
2005
◽
Cited By ~ 2
Author(s):
Jen-Chiun Lin
◽
Feipei Lai
◽
Hung-Chang Lee
Keyword(s):
Key Management
◽
Group Key Management
◽
Group Key
◽
Management Protocol
◽
Key Management Protocol
◽
Key Derivation
Download Full-text
On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function
Information Science and Applications 2017 - Lecture Notes in Electrical Engineering
◽
10.1007/978-981-10-4154-9_27
◽
2017
◽
pp. 231-240
Author(s):
Chai Wen Chuah
◽
Mustafa Mat Deris
◽
Edward Dawson
Keyword(s):
Security Analysis
◽
Cryptographic Primitive
◽
Key Derivation
Download Full-text
Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service
Information Security Technology for Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-642-29615-4_12
◽
2012
◽
pp. 162-175
Author(s):
Radu Lupu
◽
Eugen Borcoci
◽
Tinku Rasheed
Keyword(s):
Low Delay
◽
Identity Based
◽
Derivation Method
◽
Key Derivation
Download Full-text
Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation
10.5220/0010603500002998
◽
2021
◽
Author(s):
Sara Foresti
◽
Giovanni Livraga
Keyword(s):
Digital Data
◽
Key Derivation
Download Full-text
Batch-based group key management with shared key derivation in the Internet of Things
2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)
◽
10.1109/iwcmc.2013.6583810
◽
2013
◽
Cited By ~ 5
Author(s):
Luca Veltri
◽
Simone Cirani
◽
Gianluigi Ferrari
◽
Stefano Busanelli
Keyword(s):
Internet Of Things
◽
Key Management
◽
Group Key Management
◽
The Internet
◽
Group Key
◽
Shared Key
◽
The Internet Of Things
◽
Key Derivation
Download Full-text
Secured Authentication Using Anonymity and Password-Based Key Derivation Function
Mobile Web and Intelligent Information Systems - Lecture Notes in Computer Science
◽
10.1007/978-3-319-44215-0_15
◽
2016
◽
pp. 184-197
Author(s):
Mohd Izuan Mohd Saad
◽
Kamarularifin Abd Jalil
◽
Mazani Manaf
Keyword(s):
Key Derivation
Download Full-text
Design and Analysis of Password-Based Key Derivation Functions
Lecture Notes in Computer Science - Topics in Cryptology – CT-RSA 2005
◽
10.1007/978-3-540-30574-3_17
◽
2005
◽
pp. 245-261
◽
Cited By ~ 15
Author(s):
Frances F. Yao
◽
Yiqun Lisa Yin
Keyword(s):
Key Derivation
Download Full-text
On Delegating Private Key Derivation in Hierarchical Identity Based Encryption and Related Encryption Privacy
Journal of Software Engineering
◽
10.3923/jse.2016.279.284
◽
2016
◽
Vol 10
(3)
◽
pp. 279-284
Author(s):
Jian-Wu Zheng
◽
Jing Zhao
◽
Xin-Ping Guan
Keyword(s):
Private Key
◽
Identity Based Encryption
◽
Identity Based
◽
Key Derivation
Download Full-text
On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions
Proceedings of the 2018 VII International Conference on Network, Communication and Computing - ICNCC 2018
◽
10.1145/3301326.3301332
◽
2018
◽
Author(s):
Wen Wen Koh
◽
Chai Wen Chuah
Keyword(s):
Timing Analysis
◽
Side Channel
◽
Side Channel Attack
◽
Key Derivation
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close