Sciweavers

1401 search results - page 58 / 281
» Randomness in Interactive Proofs
Sort
View
ICIP
2002
IEEE
15 years 11 months ago
On steganalysis of random LSB embedding in continuous-tone images
Abstract? In this paper we present an LSB steganalysis technique that can detect the existence of hidden messages that are randomly embedded in the least significant bits of natura...
Sorina Dumitrescu, Xiaolin Wu, Nasir D. Memon
DCC
2008
IEEE
15 years 9 months ago
Semantic security for the McEliece cryptosystem without random oracles
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill M...
SEFM
2006
IEEE
15 years 3 months ago
Describing and Executing Random Reactive Systems
We present an operational model for describing random reactive systems. Some models have already been proposed for this purpose, but they generally aim at performing global reason...
Pascal Raymond, Erwan Jahier, Yvan Roux
CCS
2006
ACM
15 years 1 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
15 years 3 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup