Sciweavers

2108 search results - page 264 / 422
» Encrypted
Sort
View
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
15 years 10 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
TARK
2007
Springer
15 years 10 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
DATE
2006
IEEE
112views Hardware» more  DATE 2006»
15 years 10 months ago
Automating processor customisation: optimised memory access and resource sharing
We propose a novel methodology to generate Application Specific Instruction Processors (ASIPs) including custom instructions. Our implementation balances performance and area req...
Robert G. Dimond, Oskar Mencer, Wayne Luk
GLOBECOM
2006
IEEE
15 years 10 months ago
Bank Transfer over Quantum Channel with Digital Checks
- In recent years, many quantum cryptographic schemes have been proposed. However, it seems that there are many technical difficulties to realize them (except Quantum Key Distribut...
Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Shel...
ICMCS
2006
IEEE
110views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Video Scrambling Scheme Applicable to Local Region without Data Expansion
Recently, several scrambling techniques have been proposed for video digitally archived. These methods realize efficient processing by partial encryption on MPEG compressed data ...
Makoto Takayama, Kiyoshi Tanaka, Akio Yoneyama, Ya...