Sciweavers

476 search results - page 74 / 96
» A New Attack against Khazad
Sort
View
IWANN
2005
Springer
14 years 1 months ago
Robust Blind Image Watermarking with Independent Component Analysis: A Embedding Algorithm
Abstract. The authors propose a new solution to the blind robust watermarking of digital images. In this approach we embed the watermark into the independent components of the imag...
Juan José Murillo-Fuentes, Rafael Boloix-To...
IWDW
2004
Springer
14 years 26 days ago
Fingerprinting Curves
This paper presents a new method for robust data hiding in curves and highlights potential applications including digital fingerprinting of map document for trace and track purpos...
Hongmei Gou, Min Wu
CRYPTO
2003
Springer
95views Cryptology» more  CRYPTO 2003»
14 years 22 days ago
Plaintext Awareness via Key Registration
Abstract. In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintex...
Jonathan Herzog, Moses Liskov, Silvio Micali
FSE
1997
Springer
104views Cryptology» more  FSE 1997»
13 years 11 months ago
The Block Cipher Square
In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against di erential and linear cryptanalysis. Howeve...
Joan Daemen, Lars R. Knudsen, Vincent Rijmen
PQCRYPTO
2010
187views Cryptology» more  PQCRYPTO 2010»
13 years 11 months ago
Information-Set Decoding for Linear Codes over Fq
The best known non-structural attacks against code-based cryptosystems are based on information-set decoding. Stern’s algorithm and its improvements are well optimized and the co...
Christiane Peters