Sciweavers

472 search results - page 2 / 95
» A Software-Optimized Encryption Algorithm
Sort
View
IIHMSP
2006
IEEE
126views Multimedia» more  IIHMSP 2006»
14 years 4 days ago
Extending the Selective MPEG Encryption Algorithm PVEA
Currently, the requirements on MPEG encryption algorithms include: fast speed, format compliance, a wide range of security levels, easy implementation, etc. However, promising can...
Li Weng, Karel Wouters, Bart Preneel
AAECC
2009
Springer
138views Algorithms» more  AAECC 2009»
13 years 10 months ago
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
Abstract. We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto'07. Our work introduces: 1) ...
Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki ...
ICDE
2007
IEEE
133views Database» more  ICDE 2007»
14 years 7 months ago
Programming Patterns for Architecture-Level Software Optimizations on Frequent Pattern Mining
One very important application in the data mining domain is frequent pattern mining. Various authors have worked on improving the efficiency of this computation, mostly focusing o...
Mingliang Wei, Changhao Jiang, Marc Snir
DATE
2002
IEEE
153views Hardware» more  DATE 2002»
13 years 11 months ago
Low Power Embedded Software Optimization Using Symbolic Algebra
The market demand for portable multimedia applications has exploded in the recent years. Unfortunately, for such applications current compilers and software optimization methods o...
Armita Peymandoust, Tajana Simunic, Giovanni De Mi...
CTRSA
2012
Springer
273views Cryptology» more  CTRSA 2012»
12 years 1 months ago
On the Joint Security of Encryption and Signature in EMV
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encrypt...
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Pat...