Sciweavers

375 search results - page 51 / 75
» On the security of an image encryption method
Sort
View
FSE
1997
Springer
112views Cryptology» more  FSE 1997»
15 years 1 months ago
A Family of Trapdoor Ciphers
This paper presents several methods to construct trapdoor block ciphers. A trapdoor cipher contains some hidden structure; knowledge of this structure allows an attacker to obtain ...
Vincent Rijmen, Bart Preneel
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
14 years 11 months ago
Properties of the Discrete Differential with Cryptographic Applications
Abstract. Recently, the Csignature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems hav...
Daniel Smith-Tone
JDCTA
2008
74views more  JDCTA 2008»
14 years 9 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...
IPL
2010
180views more  IPL 2010»
14 years 7 months ago
The effects of the omission of last round's MixColumns on AES
The Advanced Encryption Standard (AES) is the most widely deployed block cipher. It follows the modern iterated block cipher approach, iterating a simple round function multiple ti...
Orr Dunkelman, Nathan Keller
FGCN
2008
IEEE
173views Communications» more  FGCN 2008»
15 years 4 months ago
Performance Analysis of Hybrid Fingerprint Matching Methods
The fingerprint verification methods include minutiae-based and image-based methods. The minutiae-based method has been frequently used, but it has limitations in performance. Thes...
Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung B...