Key Derivation Function: The SCKDF Scheme
暂无分享,去创建一个
[1] Akashi Satoh,et al. ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[2] Martin Boesgaard,et al. The Rabbit Stream Cipher , 2008, The eSTREAM Finalists.
[3] Donald E. Eastlake,et al. US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.
[4] Matthew J. B. Robshaw,et al. New Stream Cipher Designs: The eSTREAM Finalists , 2008 .
[5] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[6] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..
[7] Brian Weis,et al. Key Derivation Functions and their Uses , 2010 .
[8] Margaret Cullen,et al. PKINIT Algorithm Agility , 2012 .
[9] Anne Canteaut,et al. Sosemanuk, a Fast Software-Oriented Stream Cipher , 2008, The eSTREAM Finalists.
[10] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[11] Akashi Satoh,et al. A Compact Rijndael Hardware Architecture with S-Box Optimization , 2001, ASIACRYPT.
[12] Tal Rabin. Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings , 2010, CRYPTO.
[13] Elaine B. Barker,et al. SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .
[14] T. Good,et al. Hardware results for selected stream cipher candidates , 2007 .
[15] Alfred Menezes,et al. Topics in Cryptology – CT-RSA 2005 , 2005 .
[16] B. Preneel,et al. Trivium Specifications ? , 2022 .
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] Burton S. Kaliski,et al. PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.
[19] Carlisle M. Adams,et al. On The Security of Key Derivation Functions , 2004, ISC.
[20] Lidong Chen,et al. Recommendation for Key Derivation through Extraction-then-Expansion , 2011 .
[21] Lidong Chen,et al. Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .
[22] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[23] F. Frances Yao,et al. Design and Analysis of Password-Based Key Derivation Functions , 2005, IEEE Trans. Inf. Theory.
[24] Matthew J. B. Robshaw,et al. The eSTREAM Project , 2008, The eSTREAM Finalists.
[25] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.