Sciweavers

6137 search results - page 133 / 1228
» Securing Collaborative Applications
Sort
View
ISW
1997
Springer
14 years 1 months ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
CARDIS
2006
Springer
88views Hardware» more  CARDIS 2006»
14 years 23 days ago
Implementing Cryptography on TFT Technology for Secure Display Applications
Petros Oikonomakos, Jacques J. A. Fournier, Simon ...