Sciweavers

1769 search results - page 34 / 354
» Cryptography
Sort
View
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 3 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
CRYPTO
2003
Springer
92views Cryptology» more  CRYPTO 2003»
15 years 2 months ago
Derandomization in Cryptography
We give two applications of Nisan–Wigderson-type (“non-cryptographic”) pseudorandom generators in cryptography. Specifically, assuming the existence of an appropriate NW-ty...
Boaz Barak, Shien Jin Ong, Salil P. Vadhan
CRYPTO
2006
Springer
140views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Lattice-Based Cryptography
We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with some recent constructions of very efficient cryptogr...
Oded Regev
ICASSP
2009
IEEE
15 years 4 months ago
Color extended visual cryptography using error diffusion
This paper introduces a color visual cryptography encryption method that produces meaningful color shares via visual information pixel (VIP) synchronization and error diffusion ha...
In Koo Kang, Gonzalo R. Arce, Heung-Kyu Lee
ICASSP
2008
IEEE
15 years 4 months ago
Algebraic visual cryptography scheme for color images
This paper introduces a novel, cost effective visual cryptography scheme suitable for color image transmission over bandwidth constraint channels. Unlike previously proposed schem...
Mohsen Heidarinejad, Amirhossein Alamdar Yazdi, Ko...