Sciweavers

CVIU
2016
54views Cryptology» more  CVIU 2016»
8 years 2 months ago
Higher order maximum persistency and comparison theorems
We address combinatorial problems that can be formulated as minimization of a partially separable function of discrete variables (energy minimization in graphical models, weighted...
Alexander Shekhovtsov
CVIU
2016
70views Cryptology» more  CVIU 2016»
8 years 2 months ago
Semantic super-resolution: When and where is it useful?
Recent algorithms for exemplar-based single image super-resolution have shown impressive results, mainly due to well-chosen priors and recently also due to more accurate blur kern...
Radu Timofte, Vincent De Smet, Luc Van Gool
CVIU
2016
52views Cryptology» more  CVIU 2016»
8 years 2 months ago
Sequential Interval Network for parsing complex structured activity
We propose a new graphical model, called Sequential Interval Network (SIN), for parsing complex structured activity whose composition can be represented as a string-length limited...
Nam N. Vo, Aaron F. Bobick
CVIU
2016
78views Cryptology» more  CVIU 2016»
8 years 2 months ago
Fisher Kernel Temporal Variation-based Relevance Feedback for video retrieval
This paper proposes a novel framework for Relevance Feedback based on the Fisher Kernel (FK). Specifically, we train a Gaussian Mixture Model (GMM) on the top retrieval results (...
Ionut Mironica, Bogdan Ionescu, Jasper R. R. Uijli...
CVIU
2016
63views Cryptology» more  CVIU 2016»
8 years 2 months ago
Local Higher-Order Statistics (LHS) describing images with statistics of local non-binarized pixel patterns
We propose a new image representation for texture categorization and facial analysis, relying on the use of higher-order local differential statistics as features. It has been re...
Gaurav Sharma 0004, Frédéric Jurie
CVIU
2016
55views Cryptology» more  CVIU 2016»
8 years 2 months ago
Interdigital palm region for biometric identification
— The interdigital palm region represents about 30% of the palm area and is inherently acquired during palmprint imaging, nevertheless it has not yet attracted any noticeable att...
Aythami Morales, Ajay Kumar, Miguel A. Ferrer
CTRSA
2016
Springer
80views Cryptology» more  CTRSA 2016»
8 years 2 months ago
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and...
Colin Boyd, Britta Hale, Stig Frode Mjølsne...
CTRSA
2016
Springer
58views Cryptology» more  CTRSA 2016»
8 years 2 months ago
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
The purpose of this paper is to compare side-by-side the NTRU and BGV schemes in their non-scale invariant (messages in the lower bits), and their scale invariant (message in the u...
Ana Costache, Nigel P. Smart
CTRSA
2016
Springer
66views Cryptology» more  CTRSA 2016»
8 years 2 months ago
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran ...
CTRSA
2016
Springer
60views Cryptology» more  CTRSA 2016»
8 years 2 months ago
Constrained PRFs for Unbounded Inputs
the full version of the extended abstract that appears in the proceedings of CT-RSA 2016. A constrained pseudorandom function F : K×X → Y for a family T ⊆ 2X of subsets of X ...
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrz...