Sciweavers

27 search results - page 4 / 6
» Large encrypting binary images with higher security
Sort
View
DATE
2006
IEEE
127views Hardware» more  DATE 2006»
15 years 3 months ago
Software implementation of Tate pairing over GF(2m)
Recently, the interest about the Tate pairing over binary fields has decreased due to the existence of efficient attacks to the discrete logarithm problem in the subgroups of su...
Guido Bertoni, Luca Breveglieri, Pasqualina Fragne...
CCS
2005
ACM
15 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
ACMSE
2004
ACM
15 years 2 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
IAJIT
2010
112views more  IAJIT 2010»
14 years 8 months ago
Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information
: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Security has always been a major concern since time im...
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 1 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis