Sciweavers

63 search results - page 12 / 13
» Attacking the Knudsen-Preneel Compression Functions
Sort
View
EUROCRYPT
2008
Springer
14 years 11 months ago
Security/Efficiency Tradeoffs for Permutation-Based Hashing
We provide attacks and analysis that capture a tradeoff, in the ideal-permutation model, between the speed of a permutation-based hash function and its potential security. For coll...
Phillip Rogaway, John P. Steinberger
73
Voted
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
15 years 2 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
82
Voted
VISUALIZATION
1998
IEEE
15 years 1 months ago
Image-based rendering with occlusions via cubist images
We attack the problem of image-based rendering with occlusions and general camera motions by using distorted multiperspective images; such images provide multiple-viewpoint photom...
Andrew J. Hanson, Eric A. Wernert
ISPEC
2009
Springer
15 years 4 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Robust Watermarking in the Wigner Domain
In this paper, a new watermarking scheme in the joint timefrequency domain is introduced. Wigner distribution is used to transform an image into the spatial-spectral domain. The p...
Mahmood Al-khassaweneh, Selin Aviyente