Sciweavers

6137 search results - page 133 / 1228
» Securing Collaborative Applications
Sort
View
88
Voted
ISW
1997
Springer
15 years 6 months ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
CARDIS
2006
Springer
88views Hardware» more  CARDIS 2006»
15 years 5 months ago
Implementing Cryptography on TFT Technology for Secure Display Applications
Petros Oikonomakos, Jacques J. A. Fournier, Simon ...