1 |
NIST, Recommendation for Key Derivation Using Pseudorandom Functions, SP 800-108, Oct. 2009.
|
2 |
NIST, Recommendation for Password-Based Key Derivation, SP 800-132, Dec. 2010.
|
3 |
H. Krawczyk and P. Eronen, Hmac-based extract-and-expand key derivation function (hkdf), RFC 5869 (Proposed Standard), May 2010.
|
4 |
ID Quantique, KEY SERVER, Retrieved Mar., 26 from http://swissquantum.idquantique.com/?Key-Server#Parallel_Key_Agreements.
|
5 |
ID Quantique, CERBERIS, from http://www.idquantique.com/wordpress/wp-content/uploads/Cerberis-Datasheet.pdf.
|
6 |
R. Sarath and A. Shajin Narguman, "Key distribution using dual channel technique for ultimate security," Indian J. Sci. and Technol., vol. 8, no. 26, 2015.
|
7 |
A. Odeh, K. Elleithy, M. Alshowkan, and E. Abdelfattah, "Quantum key distribution by using public key algorithm(RSA)," IEEE INTECH 2013, pp. 83-86, London, UK, Aug. 2013.
|
8 |
ISO/IEC, Information technology-Security technique-Encryption algorithms-Part 2: Asymmetric ciphers, ISO/IEC 18033-2, May 2006.
|
9 |
NIST, Recommendation for Key Derivation through Extraction-then-expansion, SP 800-56C, Nov. 2011.
|
10 |
NIST, Recommendation for Pair-Wise key establishment schemes using integer factorization cryptography, SP 800-56B, Sept. 2014.
|
11 |
Y. S. Kim, "Group key transfer protocol based on shamir's secret sharing," J. KICS, vol. 39B no. 9, pp. 555-560, 2014.
DOI
|
12 |
NIST, Recommendation for the entropy sources used for random bit generation, SP 800-90B, Aug. 2012.
|
13 |
T. Matthias and R. Renner, A randomness extractor for the Quantis device, vol. 31. Id Quantique Technical Report, 2012.
|
14 |
B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K. Pietrzak, F. Standaert, and Y. Yu, Leftover hash lemma, revisited, Sept. 2011.
|
15 |
G. V. Assche, Quantum cryptography and secret-key Distillation, CAMBRIDGE, 2012.
|
16 |
S. Im, H. Jeon, and J. Ha, "A novel distributed secret key extraction technique for wireless network," J. KICS, vol. 39A, no. 12, pp. 708-717, 2014.
DOI
|
17 |
K. J. Ha, C. H. Seo, and D. Y. Kim, "Design of validation system for a crypto-algorithm implementation," J. KICS, vol. 39B no. 04, pp. 242-250, 2014.
DOI
|
18 |
Whitewood, Whitewood Entropy Engine, Retrieved Jan., 23 from http://www.whitewoodencryption.com/wp-content/uploads/2015/08/Whitewood_EE.pdf.
|
19 |
NIST, Secure Hash Standard(SHS), FIPS 180-4, Aug. 2015.
|
20 |
TTA, Key Derivation Functions Using ARIA/SEED, TTAK.KO-12.0241, Jul. 2014.
|
21 |
NIST, Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program, Jan. 2016.
|
22 |
H. Kang, Y. Yeom, and J. S. Kang, "An implementation of integrated tool for statistical randomness tests and entropy estimations," in Proc. KICS Winter Conf. 2016, Jeongseon, Korea, Jan. 2016.
|
23 |
G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, The KECCAK sponge function family, Retrieved Jan., 25 from http://keccak.noekeon.org.
|