Sciweavers

268 search results - page 19 / 54
» A Statistical Attack on RC6
Sort
View
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
12 years 10 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
SASN
2004
ACM
14 years 25 days ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
FC
1999
Springer
97views Cryptology» more  FC 1999»
13 years 11 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
ICIP
2000
IEEE
14 years 9 months ago
An Information-Theoretic Model for Image Watermarking and Data Hiding
An information?theoretic model for image watermarking and data hiding systems is presented in this paper. The fundamental capacity limits of these systems are determined by the st...
Gen-Iu. Lin, Mehmet Kivanç Mihçak, P...