Sciweavers

923 search results - page 2 / 185
» Improved Slide Attacks
Sort
View
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
13 years 10 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
13 years 7 months ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner
TIP
2002
102views more  TIP 2002»
13 years 5 months ago
Hierarchical watermarking for secure image authentication with localization
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to impr...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
ICMCS
2009
IEEE
158views Multimedia» more  ICMCS 2009»
13 years 4 months ago
Accurate alignment of presentation slides with educational video
Spatio-temporal alignment of electronic slides with corresponding presentation video opens up a number of possibilities for making the instructional content more accessible and un...
Quanfu Fan, Kobus Barnard, Arnon Amir, Alon Efrat
JCST
2008
175views more  JCST 2008»
13 years 6 months ago
Improved Approximate Detection of Duplicates for Data Streams Over Sliding Windows
Detecting duplicates in data streams is an important problem that has a wide range of applications. In general, precisely detecting duplicates in an unbounded data stream is not fe...
Hong Shen, Yu Zhang