How to construct random functions
Journal of the ACM (JACM)
SP 800-135 Rev. 1. Recommendation for Existing Application-Specific Key Derivation Functions
SP 800-135 Rev. 1. Recommendation for Existing Application-Specific Key Derivation Functions
Secure communication over diverse transports: [short paper]
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Lightweight user access control in energy-constrained wireless network services
UCAmI'12 Proceedings of the 6th international conference on Ubiquitous Computing and Ambient Intelligence
A pedagogical example of a stretched password-based key derivation function
Journal of Computing Sciences in Colleges
Hi-index | 0.00 |
This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.