Sciweavers

429 search results - page 35 / 86
» Permutative Additives and Exponentials
Sort
View
ASIACRYPT
2009
Springer
15 years 11 months ago
Rebound Attack on the Full Lane Compression Function
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear messag...
Krystian Matusiewicz, María Naya-Plasencia,...
ICICS
2009
Springer
15 years 11 months ago
Secure Remote Execution of Sequential Computations
Abstract. We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contributi...
Ghassan Karame, Mario Strasser, Srdjan Capkun
176
Voted
ICIP
2008
IEEE
15 years 11 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
LICS
2007
IEEE
15 years 11 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam
CIARP
2005
Springer
15 years 10 months ago
Non-supervised Classification of 2D Color Images Using Kohonen Networks and a Novel Metric
We describe the application of 1-Dimensional Kohonen Networks in the classification of color 2D images which has been evaluated in Popocatépetl Volcano’s images. The Popocatépe...
Ricardo Pérez-Aguila, Pilar Gómez-Gi...