Sciweavers

176 search results - page 32 / 36
» Distinguishing Attacks on T-Functions
Sort
View
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 8 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 9 months ago
Subspace LWE
The (decisional) learning with errors problem (LWE) asks to distinguish “noisy” inner products of a secret vector with random vectors from uniform. In recent years, the LWE pro...
Krzysztof Pietrzak
CRYPTO
2012
Springer
254views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Breaking and Repairing GCM Security Proofs
Abstract. In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probab...
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
106
Voted
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
15 years 1 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang
DASFAA
2007
IEEE
160views Database» more  DASFAA 2007»
15 years 8 months ago
Implementation of Bitmap Based Incognito and Performance Evaluation
In the era of the Internet, more and more privacy-sensitive data is published online. Even though this kind of data are published with sensitive attributes such as name and social ...
Hyun-Ho Kang, Jae-Myung Kim, Gap-Joo Na, Sang-Won ...