Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
- 27 October 2000
- book chapter
- Published by Springer Nature
- p. 546-559
- https://doi.org/10.1007/3-540-44448-3_42
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Advances in Cryptology — CRYPTO 2000Published by Springer Nature ,2000
- Building PRFs from PRPsPublished by Springer Nature ,1998
- Keying Hash Functions for Message AuthenticationPublished by Springer Nature ,1996
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- How to construct random functionsJournal of the ACM, 1986
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Theory and application of trapdoor functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982