Sciweavers

230 search results - page 22 / 46
» A Random Bit Generator Using Chaotic Maps
Sort
View
FOCS
2002
IEEE
14 years 23 days ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
14 years 1 months ago
A New Distinguisher for Clock Controlled Stream Ciphers
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly clocked stream cipher called LILI-II. LI...
Håkan Englund, Thomas Johansson
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
14 years 17 hour ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
CSREASAM
2006
13 years 9 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
ISVC
2009
Springer
14 years 12 days ago
Codebook-Based Background Subtraction to Generate Photorealistic Avatars in a Walkthrough Simulator
Foregrounds extracted from the background, which are intended to be used as photorealistic avatars for simulators in a variety of virtual worlds, should satisfy the following four ...
Anjin Park, Keechul Jung, Takeshi Kurata