Sciweavers

691 search results - page 122 / 139
» A New Security Model for Authenticated Key Agreement
Sort
View
PG
2003
IEEE
15 years 5 months ago
Illustration Watermarks for Vector Graphics
Digital watermarking is a technique for embedding information into data, such as images, 3D models, or audio files, such that some properties (i. e., security, imperceptibility, ...
Henry Sonnet, Tobias Isenberg, Jana Dittmann, Thom...
INFFUS
2011
82views more  INFFUS 2011»
14 years 3 months ago
Joint ego-motion and road geometry estimation
We provide a sensor fusion framework for solving the problem of joint ego-motion and road geometry estimation. More specifically we employ a sensor fusion framework to make syste...
Christian Lundquist, Thomas B. Schön
ASIACRYPT
2009
Springer
15 years 6 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 5 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 2 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart