Sciweavers

109 search results - page 19 / 22
» Some Attacks on the Bit-Search Generator
Sort
View
ICB
2009
Springer
194views Biometrics» more  ICB 2009»
15 years 4 months ago
FM Model Based Fingerprint Reconstruction from Minutiae Template
Minutiae-based representation is the most widely adopted fingerprint representation scheme. The compactness of minutiae template has created an impression that the minutiae templa...
Jianjiang Feng, Anil K. Jain
NDSS
2007
IEEE
15 years 3 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
CORR
2006
Springer
71views Education» more  CORR 2006»
14 years 9 months ago
Wreath Products in Stream Cipher Design
The paper develops a novel approach to stream cipher design: Both the state update function and the output function of the corresponding pseudorandom generators are compositions of...
Vladimir Anashin
FSE
2005
Springer
153views Cryptology» more  FSE 2005»
15 years 3 months ago
F-FCSR: Design of a New Class of Stream Ciphers
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This au...
François Arnault, Thierry P. Berger
TSMC
2010
14 years 4 months ago
Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness...
Xinbo Gao, Cheng Deng, Xuelong Li, Dacheng Tao