Sciweavers

87 search results - page 7 / 18
» A Verifiable Random Function with Short Proofs and Keys
Sort
View
ICIP
2002
IEEE
15 years 11 months ago
On steganalysis of random LSB embedding in continuous-tone images
Abstract? In this paper we present an LSB steganalysis technique that can detect the existence of hidden messages that are randomly embedded in the least significant bits of natura...
Sorina Dumitrescu, Xiaolin Wu, Nasir D. Memon
FOCS
2008
IEEE
15 years 4 months ago
Almost-Natural Proofs
Razborov and Rudich have shown that so-called natural proofs are not useful for separating P from NP unless hard pseudorandom number generators do not exist. This famous result is...
Timothy Y. Chow
PKC
2005
Springer
192views Cryptology» more  PKC 2005»
15 years 3 months ago
Securing RSA-KEM via the AES
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogo...
Jakob Jonsson, Matthew J. B. Robshaw
ACISP
2007
Springer
15 years 3 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter