Using the SHA-3 to Derive Encryption Keys Based on Key-File | IEEE Conference Publication | IEEE Xplore