Sciweavers

36 search results - page 5 / 8
» Cryptographic Extraction and Key Derivation: The HKDF Scheme
Sort
View
IJNSEC
2008
119views more  IJNSEC 2008»
14 years 9 months ago
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
Inspired by an old Chinese game, Go, we have designed a new graphical password scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a password. While...
Hai Tao, Carlisle Adams
74
Voted
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
15 years 10 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
ASIACRYPT
2006
Springer
15 years 1 months ago
Secure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a ske...
Qiming Li, Yagiz Sutcu, Nasir D. Memon
FOCS
2010
IEEE
14 years 7 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
IVC
2006
156views more  IVC 2006»
14 years 9 months ago
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques.Inthis communication,weproposea ...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud