Abstract. The article refers to the problem of ringing artifact suppression. The ringing effect is caused by high-frequency information corruption or loss, it appears as waves or ...
Alexey V. Umnov, Andrey S. Krylov, Andrey V. Nason...
In this paper, we propose an improvement of the detection approach that is based on the distance function. In the method, the distance values are computed inside the image to descr...
This paper focuses on the denoising of multidimensional data by a tensor subspace-based method. In a seminal work, multiway Wiener filtering was developed to minimize the mean squ...
Digital signatures are one of the most extensively used cryptographic primitives today. It is well-understood that they guarantee practical security only if the corresponding veri...
OAEP and other similar schemes proven secure in Random-Oracle Model require one or more hash functions with output size larger than those of standard hash functions. In this paper...
In this paper we propose a new approach to privately compute the set-union cardinality and the set-intersection cardinality among multiple honest-but-curious parties. Our approach ...
Rolf Egert, Marc Fischlin, David Gens, Sven Jacob,...
Abstract. XACML has become the defacto standard for enterprisewide, policy-based access control. It is a structured, extensible language that can express and enforce complex access...
Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim
The Whirlwind hash function, which outputs a 512-bit digest, was designed by Barreto et al. and published by Design, Codes and Cryptography in 2010. In this paper, we provide a tho...