Sciweavers

923 search results - page 144 / 185
» Improved Slide Attacks
Sort
View
SSWMC
2004
15 years 1 months ago
Hiding correlation-based watermark templates using secret modulation
A possible solution to the difficult problem of geometrical distortion of watermarked images in a blind watermarking scenario is to use a template grid in the autocorrelation func...
Jeroen Lichtenauer, Iwan Setyawan, Reginald L. Lag...
SPEECH
2008
71views more  SPEECH 2008»
14 years 11 months ago
Unsupervised intra-speaker variability compensation based on Gestalt and model adaptation in speaker verification with telephone
In this paper an unsupervised compensation method based on Gestalt, ISVC, is proposed to address the problem of limited enrolling data and noise robustness in text-dependent speak...
Néstor Becerra Yoma, Claudio Garretó...
FI
2010
175views more  FI 2010»
14 years 9 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
CODCRY
2011
Springer
242views Cryptology» more  CODCRY 2011»
14 years 3 months ago
Faster 2-Regular Information-Set Decoding
Fix positive integers B and w. Let C be a linear code over F2 of length Bw. The 2-regular-decoding problem is to find a nonzero codeword consisting of w length-B blocks, each of w...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 13 days ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs