Sciweavers

400 search results - page 14 / 80
» codes 2001
Sort
View
ICICS
2001
Springer
15 years 2 months ago
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
Abstract. In this paper, the cryptanalytic strength of two HwangRao Secret Error-Correcting Code (SECC) schemes is examined under a known-plaintext attack. In particular, we found ...
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
DCC
2001
IEEE
15 years 9 months ago
Weierstrass Pairs and Minimum Distance of Goppa Codes
We prove that elements of the Weierstrass gap set of a pair of points may be used to define a geometric Goppa code which has minimum distance greater than the usual lower bound. We...
Gretchen L. Matthews
WEBNET
1997
14 years 11 months ago
MiMi: A Java Implementation of the MicroMint Scheme
In this paper we describe an experimental implementation of the MicroMint micropayment scheme in Java. We apply this scheme to purchasing Web pages. A prerequisite was to accompli...
Vesna Hassler, Robert Bihlmeyer, Michael Fischer, ...
TC
1998
14 years 9 months ago
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP
Abstract—A widely used bus-encryption microprocessor is vulnerable to a new practical attack. This type of processor decrypts onthe-fly while fetching code and data, which are st...
Markus G. Kuhn
VCIP
2000
146views Communications» more  VCIP 2000»
14 years 11 months ago
Novel video coding scheme using adaptive mesh-based interpolation and node tracking
An alternative method to H.263 for encoding of moving images at bit rates below 64 kbit/s is presented using adaptive spatial subsampling, mesh based interpolation and node tracki...
Eckhart Baum, Joachim Speidel