Sciweavers

268 search results - page 16 / 54
» A Statistical Attack on RC6
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 1 months ago
A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks
— Wireless sensor networks have been deployed for various critical monitoring applications in hostile environments such as monitoring the concentration levels of hazardous gas sp...
Vinod Shukla, Daji Qiao
TCSV
2008
134views more  TCSV 2008»
13 years 7 months ago
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain
Watermark resistance to geometric attacks is an important issue in the image watermarking community. Most countermeasures proposed in the literature usually focus on the problem of...
Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang
ACCV
2007
Springer
14 years 1 months ago
High Capacity Watermarking in Nonedge Texture Under Statistical Distortion Constraint
High-capacity image watermarking scheme aims at maximize bit rate of hiding information, neither eliciting perceptible image distortion nor facilitating special watermark attack. T...
Fan Zhang, Wenyu Liu, Chunxiao Liu
FSE
2003
Springer
243views Cryptology» more  FSE 2003»
14 years 18 days ago
Optimal Key Ranking Procedures in a Statistical Cryptanalysis
Hypothesis tests have been used in the past as a tool in a cryptanalytic context. In this paper, we propose to use this paradigm and define a precise and sound statistical framewo...
Pascal Junod, Serge Vaudenay
IMA
2009
Springer
113views Cryptology» more  IMA 2009»
14 years 1 months ago
On Linear Cryptanalysis with Many Linear Approximations
Abstract. In this paper we present a theoretical framework to quantify the information brought by several linear approximations of a blockcipher without putting any restriction on ...
Benoît Gérard, Jean-Pierre Tillich