References
- NIST, Recommendation for Key Derivation Using Pseudorandom Functions, SP 800-108, Oct. 2009.
- NIST, Recommendation for Password-Based Key Derivation, SP 800-132, Dec. 2010.
- H. Krawczyk and P. Eronen, Hmac-based extract-and-expand key derivation function (hkdf), RFC 5869 (Proposed Standard), May 2010.
- ID Quantique, KEY SERVER, Retrieved Mar., 26 from http://swissquantum.idquantique.com/?Key-Server#Parallel_Key_Agreements.
- ID Quantique, CERBERIS, from http://www.idquantique.com/wordpress/wp-content/uploads/Cerberis-Datasheet.pdf.
- R. Sarath and A. Shajin Narguman, "Key distribution using dual channel technique for ultimate security," Indian J. Sci. and Technol., vol. 8, no. 26, 2015.
- A. Odeh, K. Elleithy, M. Alshowkan, and E. Abdelfattah, "Quantum key distribution by using public key algorithm(RSA)," IEEE INTECH 2013, pp. 83-86, London, UK, Aug. 2013.
- ISO/IEC, Information technology-Security technique-Encryption algorithms-Part 2: Asymmetric ciphers, ISO/IEC 18033-2, May 2006.
- NIST, Recommendation for Key Derivation through Extraction-then-expansion, SP 800-56C, Nov. 2011.
- NIST, Recommendation for Pair-Wise key establishment schemes using integer factorization cryptography, SP 800-56B, Sept. 2014.
- Y. S. Kim, "Group key transfer protocol based on shamir's secret sharing," J. KICS, vol. 39B no. 9, pp. 555-560, 2014. https://doi.org/10.7840/kics.2014.39B.9.555
- NIST, Recommendation for the entropy sources used for random bit generation, SP 800-90B, Aug. 2012.
- T. Matthias and R. Renner, A randomness extractor for the Quantis device, vol. 31. Id Quantique Technical Report, 2012.
- B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K. Pietrzak, F. Standaert, and Y. Yu, Leftover hash lemma, revisited, Sept. 2011.
- G. V. Assche, Quantum cryptography and secret-key Distillation, CAMBRIDGE, 2012.
- S. Im, H. Jeon, and J. Ha, "A novel distributed secret key extraction technique for wireless network," J. KICS, vol. 39A, no. 12, pp. 708-717, 2014. https://doi.org/10.7840/kics.2014.39A.12.708
- K. J. Ha, C. H. Seo, and D. Y. Kim, "Design of validation system for a crypto-algorithm implementation," J. KICS, vol. 39B no. 04, pp. 242-250, 2014. https://doi.org/10.7840/kics.2014.39B.4.242
- Whitewood, Whitewood Entropy Engine, Retrieved Jan., 23 from http://www.whitewoodencryption.com/wp-content/uploads/2015/08/Whitewood_EE.pdf.
- NIST, Secure Hash Standard(SHS), FIPS 180-4, Aug. 2015.
- TTA, Key Derivation Functions Using ARIA/SEED, TTAK.KO-12.0241, Jul. 2014.
- NIST, Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program, Jan. 2016.
- H. Kang, Y. Yeom, and J. S. Kang, "An implementation of integrated tool for statistical randomness tests and entropy estimations," in Proc. KICS Winter Conf. 2016, Jeongseon, Korea, Jan. 2016.
- G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, The KECCAK sponge function family, Retrieved Jan., 25 from http://keccak.noekeon.org.
Cited by
- NIST SP 800-90B 프레딕터를 이용한 잡음원의 엔트로피 추정량에 대한 실험적 분석 vol.41, pp.12, 2016, https://doi.org/10.7840/kics.2016.41.12.1892
- 시간지연을 이용한 양자비밀직접통신 vol.21, pp.12, 2016, https://doi.org/10.6109/jkiice.2017.21.12.2318
- Efficient hardware implementation and analysis of true random-number generator based on beta source vol.42, pp.4, 2016, https://doi.org/10.4218/etrij.2020-0083