Sciweavers

3898 search results - page 6 / 780
» On the Bit Extraction Problem
Sort
View
PKC
2010
Springer
234views Cryptology» more  PKC 2010»
14 years 11 months ago
Solving a 676-Bit Discrete Logarithm Problem in GF(36n)
Abstract. Pairings on elliptic curves over finite fields are crucial for constructing various cryptographic schemes. The T pairing on supersingular curves over GF(3n ) is particula...
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shi...
EUROCRYPT
2003
Springer
15 years 2 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 9 months ago
Wide spread spectrum watermarking with side information and interference cancellation
Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum...
Gaëtan Le Guelvouit, Stéphane Pateux
SIGPRO
2011
249views Hardware» more  SIGPRO 2011»
14 years 15 days ago
Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier
Quantizing real-valued templates into binary strings is a fundamental step in biometric compression and template protection. In this paper, we introduce the area under the FRR cur...
C. Chen, R. Veldhuis
CTRSA
2004
Springer
87views Cryptology» more  CTRSA 2004»
15 years 3 months ago
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard
Abstract. In [8] Vaudenay presented an attack on block cipher CBCmode encryption when a particular padding method is used. In this paper, we employ a similar approach to analyse th...
Kenneth G. Paterson, Arnold K. L. Yau