On optimal cryptographic key derivation (Q388109): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: SPINS / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.tcs.2013.04.010 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2089253004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication in key distribution schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Keying Hash Functions for Message Authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365748 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250781 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2747613 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unconditionally secure key assignment schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: New constructions for provably-secure time-bound hierarchical key assignment schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On key storage in secure networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341773 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A matrix key-distribution scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249662 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key storage in secure networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783719 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Functions and Factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: SPINS: Security protocols for sensor networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Notions for Broadcast Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A lower bound for multicast key distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: On some methods for unconditionally secure key distribution and broadcast encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some new results on key distribution patterns and broadcast encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure frameproof codes, key distribution patterns, group testing algorithms and related structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: An application of ramp schemes to broadcast encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250813 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 04:48, 7 July 2024

scientific article
Language Label Description Also known as
English
On optimal cryptographic key derivation
scientific article

    Statements

    On optimal cryptographic key derivation (English)
    0 references
    0 references
    19 December 2013
    0 references
    0 references
    secure group communication
    0 references
    broadcast encryption
    0 references
    capability-based access control
    0 references
    secure key derivation
    0 references
    pseudorandom functions
    0 references
    0 references