Sciweavers

658 search results - page 81 / 132
» The Grindahl Hash Functions
Sort
View
114
Voted
IACR
2011
135views more  IACR 2011»
14 years 13 days ago
Algebraic Complexity Reduction and Cryptanalysis of GOST
Abstract. GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. Its large key size of 256 bits at a particularly low implementa...
Nicolas Courtois
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 6 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
CVPR
2008
IEEE
16 years 2 months ago
Fast image search for learned metrics
We introduce a method that enables scalable image search for learned metrics. Given pairwise similarity and dissimilarity constraints between some images, we learn a Mahalanobis d...
Prateek Jain, Brian Kulis, Kristen Grauman
89
Voted
ICIP
2006
IEEE
16 years 2 months ago
A Video Fingerprint Based on Visual Digest and Local Fingerprints
A fingerprinting design extracts discriminating features, called fingerprints. The extracted features are unique and specific to each image/video. The visual hash is usually a glo...
Ayoub Massoudi, Bertrand Chupeau, Claire-Hé...
107
Voted
SASO
2008
IEEE
15 years 7 months ago
Using Global Information for Load Balancing in DHTs
Distributed Hash Tables (DHT) with order-preserving hash functions require load balancing to ensure an even item-load over all nodes. While previous item-balancing algorithms only...
Mikael Högqvist, Seif Haridi, Nico Kruber, Al...