Sciweavers

2237 search results - page 98 / 448
» On the Security of Random Sources
Sort
View
ICPR
2008
IEEE
15 years 11 months ago
Combining shape-from-shading and stereo using Gaussian-Markov random fields
In this paper we present a method of combining stereo and shape-from-shading information, taking account of the local reliability of each shape estimate. Local estimates of dispar...
Tom S. F. Haines, Richard C. Wilson
180
Voted
ACISP
2004
Springer
15 years 10 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
IJNSEC
2010
98views more  IJNSEC 2010»
14 years 12 months ago
A Random Bit Generator Using Chaotic Maps
Chaotic systems have many interesting features such as sensitivity on initial condition and system parameter, ergodicity and mixing properties. In this paper, we exploit these int...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
131
Voted
SACRYPT
1998
Springer
15 years 9 months ago
Computational Alternatives to Random Number Generators
In this paper, we present a simple method for generating random-based signatures when random number generators are either unavailable or of suspected quality (malicious or accident...
David M'Raïhi, David Naccache, David Pointche...
TYPES
2004
Springer
15 years 10 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento