Sciweavers

849 search results - page 54 / 170
» Completely Non-malleable Schemes
Sort
View
81
Voted
ITCC
2002
IEEE
15 years 5 months ago
Enhancing Watermark Robustness through Mixture of Watermarked Digital Objects
After the failure of copy prevention methods, watermarking stays the main technical safeguard of electronic copyright. There are many properties that a watermarking scheme should ...
Josep Domingo-Ferrer, Francesc Sebé
EUROCRYPT
2001
Springer
15 years 5 months ago
Structural Cryptanalysis of SASAS
In this paper we consider the security of block ciphers which contain alternate layers of invertible S-boxes and affine mappings (there are many popular cryptosystems which use thi...
Alex Biryukov, Adi Shamir
123
Voted
CP
2000
Springer
15 years 4 months ago
New Search Heuristics for Max-CSP
Abstract. This paper evaluates the power of a new scheme that generates search heuristics mechanically. This approach was presented and evaluated rst in the context of optimization...
Kalev Kask
ITC
1996
IEEE
98views Hardware» more  ITC 1996»
15 years 4 months ago
Mixed-Mode BIST Using Embedded Processors
Abstract. In complex systems, embedded processors may be used to run software routines for test pattern generation and response evaluation. For system components which are not comp...
Sybille Hellebrand, Hans-Joachim Wunderlich, Andre...
77
Voted
ICASSP
2010
IEEE
15 years 22 days ago
Flexcode - flexible audio coding
Modern networks are highly variable and, as a result, source coders are commonly used under conditions that they were not designed for. We address this problem with a source-codin...
Janusz Klejsa, Minyue Li, W. Bastiaan Kleijn