A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Derivation of Database Keys' Operations
2011
Issues in Informing Science and Information Technology
The necessary algorithms to derive database keys were analyzed, modified and coded in Java Programming Language to display graphical key derivation input interface. ...
It studied relational schema and functional dependencies to derive keys of primary, candidate, alternative and super key of relational database. ...
derivation to derive candidate leys, primary keys, alternative keys and super keys. ...
doi:10.28945/1418
fatcat:jsoovp7yozdklijg7zmnzzfx7y
Key Derivation without Entropy Waste
[chapter]
2014
Lecture Notes in Computer Science
Our goal is to design a key-derivation function (KDF) h that converts any random source X of min-entropy k into a sufficiently "good" key h(X), guaranteeing that P (h(X)) has comparable security δ ′ which ...
We revisit the classical problem of converting an imperfect source of randomness into a usable cryptographic key. ...
We'd like to have a Key Derivation Function (KDF) h : {0, 1} n → {0, 1} m with the property that the derived key h(X) can be safely used by P , even though the original security of P was only analyzed ...
doi:10.1007/978-3-642-55220-5_6
fatcat:ohoxslvvnbhm5le2pngzqo7y3u
Derivation of paleoclassical key hypothesis
2007
Physics of Plasmas
The paleoclassical model of radial electron heat transport in resistive, current-carrying toroidal plasmas is based on a key hypothesis-that electron guiding centers move and diffuse with radially localized ...
The present analysis shows the ū , ū G , and D effects are all part of a deductive,
040701-3 Derivation of paleoclassical key hypothesis Phys. ...
Pearlstein, whose pointing out of Ref. 10 led to this direct derivation based on transforming to the p flux coordinate. ...
doi:10.1063/1.2715564
fatcat:iqprlay2szhz5iqzmdqjbyif2e
Efficient Group Key Management Protocol with One-Way Key Derivation
2005
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
The server does not have to send new keys to those members who can derive the keys by themselves, and the total number of encrypted keys transmitted per rekeying operation becomes fewer. ...
An efficient group key management protocol is proposed for centralized dynamic groups, and one-way key derivation is integrated with key trees to reduce the communication overhead of rekeying operations ...
Figure 2 . 2 Key derivation (single join).
(a), new key values are
Figure 3 . 3 Key derivation (single leave). ...
doi:10.1109/lcn.2005.61
dblp:conf/lcn/LinLL05
fatcat:k274n7owsvgnblqcs4cpw3qv5i
Deriving Secrecy in Key Establishment Protocols
[chapter]
2006
Lecture Notes in Computer Science
The approach evolved as a design strategy in the Protocol Derivation Assistant (Pda), a semantically based environment and toolkit for derivational approach to security [2, 3] . ...
Symmetric key derivation. ...
The DH-style key agreement protocols now fall into two subfamilies, depending on whether the key derivation functions K 0 and K 1 are the same or not. Asymmetric key derivation. ...
doi:10.1007/11863908_24
fatcat:m7lopbeumbhipd6dzuso4sryly
Derived search keys for bibliographic retrieval
1983
Proceedings of the 6th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '83
Each key incorporates codes derived by various positional selection methods and their discriminating strength proves to be well over 95%.
I. ...
digits in the key. ...
doi:10.1145/511793.511825
dblp:conf/sigir/Yannakoudakis83
fatcat:q6br2zyrl5hqtdoyk3fqxvccwm
Multi-Factor Key Derivation Function (MFKDF)
[article]
2022
arXiv
pre-print
Finally, by "stacking" derived keys, we provide a means of cryptographically enforcing arbitrarily specific key derivation policies. ...
Our function expands upon password-based key derivation functions (PBKDFs) with support for using other popular authentication factors like TOTP, HOTP, and hardware tokens in the key derivation process ...
of terms such as "multifactor key derivation," "two-factor key derivation," "totp key derivation," and "hotp key derivation." ...
arXiv:2208.05586v1
fatcat:cacexw3zlvc57gbj3e7knsekse
Key Derivation Function: The SCKDF Scheme
[chapter]
2013
IFIP Advances in Information and Communication Technology
A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. ...
The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions ...
Introduction A key derivation function (KDF ) is a basic component of a cryptographic system. ...
doi:10.1007/978-3-642-39218-4_10
fatcat:tmacfyygfrakvdrnme7at5jb4e
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
[chapter]
2003
Lecture Notes in Computer Science
KPS allows a designated group of users to establish a common key non-interactively. ...
We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). ...
, d many keys can be derived. ...
doi:10.1007/978-3-540-40061-5_24
fatcat:dymoowturfc5rnznbbfkl2bpgq
Leakage-resilient Cryptography with key derived from sensitive data
[article]
2018
arXiv
pre-print
Additionally, we guarantee privacy of the data the actual keys are derived from. ...
We propose a method to derive keys for such protocols on-the-fly from weakly random private data (like text documents or photos, users keep on their disks anyway for non-cryptographic purposes) in such ...
on our key-derivation procedure. ...
arXiv:1502.00172v3
fatcat:yhcoiogqqbhi3hyp3wb4ujhw6q
A Forward-Secure Symmetric-Key Derivation Protocol
[chapter]
2010
Lecture Notes in Computer Science
The server can only process N computations in order to retrieve the derived key corresponding to a given message. ...
At the present time, one standard is widely deployed: the Derive Unique Key Per Transaction (DUKPT) scheme defined in ANSI X9.24. ...
key derivation. ...
doi:10.1007/978-3-642-17373-8_15
fatcat:pqpvf63jabbj3bl2662zb54ss4
A Note on Practical Key Derivation Functions
2011
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
In this article, we first review key derivation functions specified in NIST SP 800-108 and one proposed by Krawczyk. ...
Then, we propose parallelizable key derivation functions obtained by modifying or using the existing schemes. ...
Introduction Key derivation functions (KDFs) are widely used in cryptography. ...
doi:10.1587/transfun.e94.a.1764
fatcat:mgibpx3n7fbfzf4kgv3vym4sma
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
[chapter]
2015
Lecture Notes in Computer Science
specified by the adversary from a class Φ of so-called Related-Key Derivation (RKD) functions. ...
This paper extends the notion of non-malleable Key Derivation Functions (nm-KDFs), introduced by Faust et al. (EUROCRYPT'14), to continuous nm-KDFs. ...
pp, which defines the derivation key space S and the derived key space {0, 1} m . (2) KDF.Sample(pp), on input pp, samples a random derivation key s ∈ S and computes a public key, denoted by π. (3) The ...
doi:10.1007/978-3-662-46447-2_25
fatcat:xvabozkefvdznlwqge7ssnixty
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
[chapter]
2009
Lecture Notes in Computer Science
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and without any subsequent ...
In this context, Jeong and Lee [27] recently specified and analyzed a related mechanism where keys are derived in parallel from ephemeral and long-lived exponents. ...
P is a group key exchange protocol enabling on-demand derivation of p2p keys (GKE+P) if P consists of the group key exchange protocol GKE and a p2p key derivation algorithm P2P defined as follows: P.GKE ...
doi:10.1007/978-3-642-01957-9_1
fatcat:5wreasshc5gyrcp4fz7f7r5jky
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
[chapter]
2015
Lecture Notes in Computer Science
Whereas how to properly mix the keys into an un-keyed Feistel construction without appealing to domain separation technique to obtain a block cipher which is provably secure against known-key and chosen-key ...
2n-bit blocks and n-bit keys, assuming the n-to-n-bit round functions F1, . . . , F21 to be random and public and an identical user-provided n-bit key to be applied at each round. ...
However, practical key derivation algorithms are usually designed to be "lightweight" and moderately complex, and KAF with such moderately complex key derivations may still be broken in hash mode (the ...
doi:10.1007/978-3-662-46494-6_6
fatcat:tisd2cvdfveildddmgxkkewjhi
« Previous
Showing results 1 — 15 out of 4,295,268 results