Sciweavers

233 search results - page 14 / 47
» Data Encryption Using MRF with an RSA Key
Sort
View
93
Voted
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 3 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
IACR
2011
122views more  IACR 2011»
13 years 11 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
ISSA
2004
15 years 1 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
CVPR
2012
IEEE
13 years 2 months ago
RGB-(D) scene labeling: Features and algorithms
Scene labeling research has mostly focused on outdoor scenes, leaving the harder case of indoor scenes poorly understood. Microsoft Kinect dramatically changed the landscape, show...
Xiaofeng Ren, Liefeng Bo, Dieter Fox
89
Voted
CCS
2008
ACM
15 years 1 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...