Sciweavers

1769 search results - page 145 / 354
» Cryptography
Sort
View
DATE
2010
IEEE
125views Hardware» more  DATE 2010»
15 years 8 months ago
pSHS: A scalable parallel software implementation of Montgomery multiplication for multicore systems
—Parallel programming techniques have become one of the great challenges in the transition from single-core to multicore architectures. In this paper, we investigate the parallel...
Zhimin Chen, Patrick Schaumont
128
Voted
IEEEMSP
2002
IEEE
138views Multimedia» more  IEEEMSP 2002»
15 years 8 months ago
A review of algorithms for audio fingerprinting
— An audio fingerprint is a content-based compact signature that summarizes an audio recording. Audio Fingerprinting technologies have recently attracted attention since they al...
Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma
EUROCRYPT
2010
Springer
15 years 8 months ago
Bonsai Trees, or How to Delegate a Lattice Basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include...
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Pei...
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 8 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
PKC
2001
Springer
95views Cryptology» more  PKC 2001»
15 years 8 months ago
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class of the decision problems. We show the relationship a...
Tatsuaki Okamoto, David Pointcheval