Sciweavers

248 search results - page 29 / 50
» Fault Attacks on Signature Schemes
Sort
View
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 12 months ago
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ICPADS
2005
IEEE
15 years 5 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
15 years 5 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
IPPS
2006
IEEE
15 years 5 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
14 years 11 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...