Sciweavers

22 search results - page 2 / 5
» A Signcryption Scheme Based on Integer Factorization
Sort
View
ICIP
2008
IEEE
14 years 7 months ago
Lossy to lossless image compression based on reversible integer DCT
A progressive image compression scheme is investigated using reversible integer discrete cosine transform (RDCT) which is derived from the matrix factorization theory. Previous te...
Lei Wang, Jiaji Wu, Licheng Jiao, Li Zhang, Guangm...
IJNSEC
2011
239views more  IJNSEC 2011»
13 years 8 days ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
TIP
2002
116views more  TIP 2002»
13 years 5 months ago
Optimization and implementation of the integer wavelet transform for image coding
Abstract--This paper deals with the design and implementation of an image transform coding algorithm based on the integer wavelet transform (IWT). First of all, criteria are propos...
Marco Grangetto, Enrico Magli, Maurizio Martina, G...
ENTCS
2006
124views more  ENTCS 2006»
13 years 5 months ago
A New Rabin-type Trapdoor Permutation Equivalent to Factoring
Public key cryptography has been invented to overcome some key management problems in open networks. Although nearly all aspects of public key cryptography rely on the existence of...
Katja Schmidt-Samoa
FCCM
2005
IEEE
132views VLSI» more  FCCM 2005»
13 years 11 months ago
Hardware Factorization Based on Elliptic Curve Method
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is ...
Martin Simka, Jan Pelzl, Thorsten Kleinjung, Jens ...