Showing 1 - 20 results of 243 for search '"cryptographic key"', query time: 0.44s Refine Results
  1. 1

    CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK by U. F. Holikau, V. L. Pivovarov

    Published 2016-07-01
    “…The article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    RSA Cryptographic Key Generation Using Fingerprint Minutiae by Mofeed Rashid, Huda Zaki

    Published 2014-12-01
    “…Human users find difficult to remember long cryptographic keys. Therefore, researchers, for a long time period, have been investigating ways to use biometric features of the user rather than memorable password or passphrase, in an attempt to produce tough and unrepeatable cryptographic keys and to construct the key unpredictable to a hacker who is deficient of important knowledge about the user's biometrics. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions by Bertrand Cambou, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg, Jordan Wright

    Published 2021-03-01
    “…In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys is then more complex for handling longer keys. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Generating biometric random cryptographic key based on unique fingerprint features by Bahram Rashidi, Ali Goudarzi

    Published 2023-06-01
    “…This paper uses the unique biometric features of fingerprints to generate random cryptographic keys. The main aspects of the security of the generated key include the privacy of the fingerprint and the randomness and complexity of the key generation algorithm. …”
    Get full text
    Article
  15. 15

    Generate Cryptographic key using generated 3D- Digital Image by Hala B. Abdul Wahab, Suhad M. Kadhum, Ekhlas K. Gbashi

    Published 2009-01-01
    “…Theweakness of the cryptographic key generated from normal color image is clear due to thenearest pixel values of image. …”
    Get full text
    Article
  16. 16

    Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation by Alaa Noori Mazher, Jumana Waleed

    Published 2022-02-01
    Subjects: “…Retina, Glowworm Swarm Optimization (GSO), Chaotic map, Random cryptographic key generation…”
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach by Pratyusa Mukherjee, Hitendra Garg, Chittaranjan Pradhan, Soumik Ghosh, Subrata Chowdhury, Gautam Srivastava

    Published 2022-09-01
    “…Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of the keys are rendered weak as they are prone to intrusions. …”
    Get full text
    Article
  20. 20