共 50 条
- [1] Enhancing the Related-Key Security of PIPO Through New Key Schedules INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT I, 2024, 14561 : 3 - 18
- [2] A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 10 - 23
- [3] Security analysis for key generation systems using face images ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3455 - 3458
- [4] Quantum key distribution using multilevel encoding:: security analysis JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2002, 35 (47): : 10065 - 10076
- [5] Analysis of Using Java']Java Card for DRM Master Key Security 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 1129 - +
- [6] Security Analysis and Key Modification for ZHFE POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 197 - 212
- [7] Security Analysis of the MLS Key Derivation 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 2535 - 2553
- [8] Security Analysis of Authenticated key Agreement Protocol using Extended SVO Logic MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 421 - 424
- [9] Generation of Security Key using ECG Signal 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 895 - 900