On optimal cryptographic key derivation
From MaRDI portal
Publication:388109
DOI10.1016/j.tcs.2013.04.010zbMath1294.94038OpenAlexW2089253004MaRDI QIDQ388109
Publication date: 19 December 2013
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2013.04.010
pseudorandom functionsbroadcast encryptioncapability-based access controlsecure group communicationsecure key derivation
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An application of ramp schemes to broadcast encryption
- A lower bound for multicast key distribution
- A matrix key-distribution scheme
- New constructions for provably-secure time-bound hierarchical key assignment schemes
- Key storage in secure networks
- Some new results on key distribution patterns and broadcast encryption
- On some methods for unconditionally secure key distribution and broadcast encryption
- Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
- SPINS: Security protocols for sensor networks
- On key storage in secure networks
- Unconditionally secure key assignment schemes
- Security Notions for Broadcast Encryption
- Pseudorandom Functions and Factoring
- Keying Hash Functions for Message Authentication
- Foundations of Cryptography
- Communication in key distribution schemes
- Advances in Cryptology - EUROCRYPT 2004
- Theory of Cryptography
- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
- Fast Software Encryption
This page was built for publication: On optimal cryptographic key derivation