-
21
Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation
Published 2018-01-01Subjects: “…Cryptographic key generation…”
Get full text
Article -
22
Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept
Published 2020-09-01Subjects: Get full text
Article -
23
Implementation and characterization of flash-based hardware security primitives for cryptographic key generation
Published 2023-04-01Subjects: “…cryptographic key…”
Get full text
Article -
24
-
25
-
26
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
Published 2022-08-01“… Security evaluations for full cryptographic keys is a very important research topic since the past decade. …”
Get full text
Article -
27
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
Published 2012-03-01“…The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. …”
Get full text
Article -
28
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
Published 2022-08-01“… Security evaluations for full cryptographic keys is a very important research topic since the past decade. …”
Get full text
Article -
29
-
30
Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Published 2020-07-01“…We obtain 0.76%, and 0.48% mean Half Total Error Rate (HTER) for 18-channel and single-channel cryptographic key generation systems respectively.…”
Get full text
Article -
31
Combined formаtion of a cryptographic key using synchronized artificial neural networks
Published 2021-02-01Subjects: Get full text
Article -
32
Enhancing the secrecy of a cryptographic key generated using synchronized artificial neural networks1
Published 2020-03-01Subjects: Get full text
Article -
33
-
34
-
35
A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
Published 2021-10-01“…This article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. …”
Get full text
Article -
36
Attack on synchronized artificial neural networks, forming a common secret by deferred search
Published 2019-06-01Subjects: Get full text
Article -
37
-
38
Multi-Party Cryptographic Key Distribution Protocol over a Public Network Based on a Quick-Response Code
Published 2022-05-01Subjects: “…cryptographic key distribution…”
Get full text
Article -
39
Enhancing Communication Security an In-Vehicle Wireless Sensor Network
Published 2024-03-01Subjects: Get full text
Article -
40
Efficient combined security system for wireless sensor network
Published 2012-11-01Subjects: Get full text
Article