Sciweavers

569 search results - page 76 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
ENC
2004
IEEE
15 years 3 months ago
On the Hardware Design of an Elliptic Curve Cryptosystem
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
Miguel Morales-Sandoval, Claudia Feregrino Uribe
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
16 years 10 days ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
DGO
2007
174views Education» more  DGO 2007»
15 years 1 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
ISI
2007
Springer
15 years 6 months ago
FACT: Fast Algorithm for Categorizing Text
— With the ever-increasing number of digital documents, the ability to automatically classifying those documents both quickly and accurately is becoming more critical and difficu...
Saket S. R. Mengle, Nazli Goharian, Alana Platt
ICICIC
2006
IEEE
15 years 5 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...