Sciweavers

208 search results - page 20 / 42
» Variationally universal hashing
Sort
View
CRYPTO
2003
Springer
173views Cryptology» more  CRYPTO 2003»
15 years 2 months ago
A Tweakable Enciphering Mode
We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2. When the und...
Shai Halevi, Phillip Rogaway
ASIACRYPT
2006
Springer
15 years 1 months ago
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
We consider the problem of cheating in secret sharing schemes, cheating in which individuals submit forged shares in the secret reconstruction phase in an effort to make another pa...
Satoshi Obana, Toshinori Araki
CORR
2010
Springer
90views Education» more  CORR 2010»
14 years 7 months ago
Fast Pseudo-Random Fingerprints
Abstract. We propose a method to exponentially speed up computation of various fingerprints, such as the ones used to compute similarity and rarity in massive data sets. Rather the...
Yoram Bachrach, Ely Porat
IACR
2011
88views more  IACR 2011»
13 years 9 months ago
GCM, GHASH and Weak Keys
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...
Markku-Juhani O. Saarinen
CVPR
2009
IEEE
16 years 4 months ago
Large Displacement Optical Flow
The literature currently provides two ways to establish point correspondences between images with moving objects. On one side, there are energy minimization methods that yield v...
Thomas Brox (University of California, Berkeley), ...