Sciweavers

476 search results - page 70 / 96
» A New Attack against Khazad
Sort
View
ISCIS
2003
Springer
14 years 22 days ago
A Video Watermarking Algorithm Based on the Human Visual System Properties
Abstract. In this paper, we propose a new video watermarking algorithm based on the human visual system (HVS) properties to find effective locations in video sequences for robust ...
Ji-Young Moon, Yo-Sung Ho
CARDIS
1998
Springer
95views Hardware» more  CARDIS 1998»
13 years 11 months ago
Serpent and Smartcards
We proposed a new block cipher, Serpent, as a candidate for the Advanced Encryption Standard. This algorithm uses a new structure that simultaneously allows a more rapid avalanche,...
Ross J. Anderson, Eli Biham, Lars R. Knudsen
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
13 years 11 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...
LATINCRYPT
2010
13 years 6 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
CCS
2011
ACM
12 years 7 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...