Sciweavers

36 search results - page 1 / 8
» Cryptographic Extraction and Key Derivation: The HKDF Scheme
Sort
View
ESORICS
2007
Springer
14 years 5 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
ICPR
2006
IEEE
14 years 12 months ago
Contour Encoding Based on Extraction of Key Points Using Wavelet Transform
In many situations it is convenient to represent pictorial data in the form of contours. It may become necessary to compress such contour data for efficient storage and transmissi...
Pravas Mahapatra, Vishnu Makkapati
DFT
2007
IEEE
101views VLSI» more  DFT 2007»
14 years 5 months ago
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits
Many side-channel attacks on implementations of cryptographic algorithms have been developed in recent years demonstrating the ease of extracting the secret key. In response, vari...
Francesco Regazzoni, Thomas Eisenbarth, Johann Gro...
IEEECIT
2005
IEEE
14 years 4 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu