Login / Signup
Using the SHA-3 to Derive Encryption Keys Based on Key-File.
Petr Zacek
David Malaník
Petra Holbikova
Roman Jasek
Lukas Kralik
Published in:
EECS (2018)
Keyphrases
</>
private key
secret key
hash functions
secure communication
database
public key
ciphertext
block cipher
high security
data sets
databases
file system
encryption scheme
image encryption
xml keys
data encryption standard