4,295,268 Hits in 5.5 sec

Derivation of Database Keys' Operations

Adio Taofiki Akinwale, Olusegun Folorunso, Adesina S. Sodiya
2011 Issues in Informing Science and Information Technology  
The necessary algorithms to derive database keys were analyzed, modified and coded in Java Programming Language to display graphical key derivation input interface.  ...  It studied relational schema and functional dependencies to derive keys of primary, candidate, alternative and super key of relational database.  ...  derivation to derive candidate leys, primary keys, alternative keys and super keys.  ... 
doi:10.28945/1418 fatcat:jsoovp7yozdklijg7zmnzzfx7y

Key Derivation without Entropy Waste [chapter]

Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
2014 Lecture Notes in Computer Science  
Our goal is to design a key-derivation function (KDF) h that converts any random source X of min-entropy k into a sufficiently "good" key h(X), guaranteeing that P (h(X)) has comparable security δ ′ which  ...  We revisit the classical problem of converting an imperfect source of randomness into a usable cryptographic key.  ...  We'd like to have a Key Derivation Function (KDF) h : {0, 1} n → {0, 1} m with the property that the derived key h(X) can be safely used by P , even though the original security of P was only analyzed  ... 
doi:10.1007/978-3-642-55220-5_6 fatcat:ohoxslvvnbhm5le2pngzqo7y3u

Derivation of paleoclassical key hypothesis

J. D. Callen
2007 Physics of Plasmas  
The paleoclassical model of radial electron heat transport in resistive, current-carrying toroidal plasmas is based on a key hypothesis-that electron guiding centers move and diffuse with radially localized  ...  The present analysis shows the ū , ū G , and D effects are all part of a deductive, 040701-3 Derivation of paleoclassical key hypothesis Phys.  ...  Pearlstein, whose pointing out of Ref. 10 led to this direct derivation based on transforming to the p flux coordinate.  ... 
doi:10.1063/1.2715564 fatcat:iqprlay2szhz5iqzmdqjbyif2e

Efficient Group Key Management Protocol with One-Way Key Derivation

Jen-Chiun Lin, Feipei Lai, Hung-Chang Lee
2005 The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l  
The server does not have to send new keys to those members who can derive the keys by themselves, and the total number of encrypted keys transmitted per rekeying operation becomes fewer.  ...  An efficient group key management protocol is proposed for centralized dynamic groups, and one-way key derivation is integrated with key trees to reduce the communication overhead of rekeying operations  ...  Figure 2 . 2 Key derivation (single join). (a), new key values are Figure 3 . 3 Key derivation (single leave).  ... 
doi:10.1109/lcn.2005.61 dblp:conf/lcn/LinLL05 fatcat:k274n7owsvgnblqcs4cpw3qv5i

Deriving Secrecy in Key Establishment Protocols [chapter]

Dusko Pavlovic, Catherine Meadows
2006 Lecture Notes in Computer Science  
The approach evolved as a design strategy in the Protocol Derivation Assistant (Pda), a semantically based environment and toolkit for derivational approach to security [2, 3] .  ...  Symmetric key derivation.  ...  The DH-style key agreement protocols now fall into two subfamilies, depending on whether the key derivation functions K 0 and K 1 are the same or not. Asymmetric key derivation.  ... 
doi:10.1007/11863908_24 fatcat:m7lopbeumbhipd6dzuso4sryly

Derived search keys for bibliographic retrieval

E J Yannakoudakis
1983 Proceedings of the 6th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '83  
Each key incorporates codes derived by various positional selection methods and their discriminating strength proves to be well over 95%. I.  ...  digits in the key.  ... 
doi:10.1145/511793.511825 dblp:conf/sigir/Yannakoudakis83 fatcat:q6br2zyrl5hqtdoyk3fqxvccwm

Multi-Factor Key Derivation Function (MFKDF) [article]

Vivek Nair, Dawn Song
2022 arXiv   pre-print
Finally, by "stacking" derived keys, we provide a means of cryptographically enforcing arbitrarily specific key derivation policies.  ...  Our function expands upon password-based key derivation functions (PBKDFs) with support for using other popular authentication factors like TOTP, HOTP, and hardware tokens in the key derivation process  ...  of terms such as "multifactor key derivation," "two-factor key derivation," "totp key derivation," and "hotp key derivation."  ... 
arXiv:2208.05586v1 fatcat:cacexw3zlvc57gbj3e7knsekse

Key Derivation Function: The SCKDF Scheme [chapter]

Chai Wen Chuah, Edward Dawson, Leonie Simpson
2013 IFIP Advances in Information and Communication Technology  
A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value.  ...  The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions  ...  Introduction A key derivation function (KDF ) is a basic component of a cryptographic system.  ... 
doi:10.1007/978-3-642-39218-4_10 fatcat:tmacfyygfrakvdrnme7at5jb4e

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes [chapter]

Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
2003 Lecture Notes in Computer Science  
KPS allows a designated group of users to establish a common key non-interactively.  ...  We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS).  ...  , d many keys can be derived.  ... 
doi:10.1007/978-3-540-40061-5_24 fatcat:dymoowturfc5rnznbbfkl2bpgq

Leakage-resilient Cryptography with key derived from sensitive data [article]

Konrad Durnoga, Tomasz Kazana, Michał Zając, Maciej Zdanowicz
2018 arXiv   pre-print
Additionally, we guarantee privacy of the data the actual keys are derived from.  ...  We propose a method to derive keys for such protocols on-the-fly from weakly random private data (like text documents or photos, users keep on their disks anyway for non-cryptographic purposes) in such  ...  on our key-derivation procedure.  ... 
arXiv:1502.00172v3 fatcat:yhcoiogqqbhi3hyp3wb4ujhw6q

A Forward-Secure Symmetric-Key Derivation Protocol [chapter]

Eric Brier, Thomas Peyrin
2010 Lecture Notes in Computer Science  
The server can only process N computations in order to retrieve the derived key corresponding to a given message.  ...  At the present time, one standard is widely deployed: the Derive Unique Key Per Transaction (DUKPT) scheme defined in ANSI X9.24.  ...  key derivation.  ... 
doi:10.1007/978-3-642-17373-8_15 fatcat:pqpvf63jabbj3bl2662zb54ss4

A Note on Practical Key Derivation Functions

Shoichi HIROSE
2011 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
In this article, we first review key derivation functions specified in NIST SP 800-108 and one proposed by Krawczyk.  ...  Then, we propose parallelizable key derivation functions obtained by modifying or using the existing schemes.  ...  Introduction Key derivation functions (KDFs) are widely used in cryptography.  ... 
doi:10.1587/transfun.e94.a.1764 fatcat:mgibpx3n7fbfzf4kgv3vym4sma

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security [chapter]

Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
2015 Lecture Notes in Computer Science  
specified by the adversary from a class Φ of so-called Related-Key Derivation (RKD) functions.  ...  This paper extends the notion of non-malleable Key Derivation Functions (nm-KDFs), introduced by Faust et al. (EUROCRYPT'14), to continuous nm-KDFs.  ...  pp, which defines the derivation key space S and the derived key space {0, 1} m . (2) KDF.Sample(pp), on input pp, samples a random derivation key s ∈ S and computes a public key, denoted by π. (3) The  ... 
doi:10.1007/978-3-662-46447-2_25 fatcat:xvabozkefvdznlwqge7ssnixty

Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys [chapter]

Mark Manulis
2009 Lecture Notes in Computer Science  
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and without any subsequent  ...  In this context, Jeong and Lee [27] recently specified and analyzed a related mechanism where keys are derived in parallel from ephemeral and long-lived exponents.  ...  P is a group key exchange protocol enabling on-demand derivation of p2p keys (GKE+P) if P consists of the group key exchange protocol GKE and a p2p key derivation algorithm P2P defined as follows: P.GKE  ... 
doi:10.1007/978-3-642-01957-9_1 fatcat:5wreasshc5gyrcp4fz7f7r5jky

On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation [chapter]

Chun Guo, Dongdai Lin
2015 Lecture Notes in Computer Science  
Whereas how to properly mix the keys into an un-keyed Feistel construction without appealing to domain separation technique to obtain a block cipher which is provably secure against known-key and chosen-key  ...  2n-bit blocks and n-bit keys, assuming the n-to-n-bit round functions F1, . . . , F21 to be random and public and an identical user-provided n-bit key to be applied at each round.  ...  However, practical key derivation algorithms are usually designed to be "lightweight" and moderately complex, and KAF with such moderately complex key derivations may still be broken in hash mode (the  ... 
doi:10.1007/978-3-662-46494-6_6 fatcat:tisd2cvdfveildddmgxkkewjhi
« Previous Showing results 1 — 15 out of 4,295,268 results