Sciweavers

87 search results - page 18 / 18
» Ciphers Secure against Related-Key Attacks
Sort
View
MM
2004
ACM
97views Multimedia» more  MM 2004»
13 years 10 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
13 years 8 months ago
Indistinguishability Amplification
system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and pro...
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner