Sciweavers

268 search results - page 41 / 54
» A Statistical Attack on RC6
Sort
View
EUROCRYPT
2009
Springer
14 years 8 months ago
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
The existence of encryption and commitment schemes secure under selective opening attack (SOA) has remained open despite considerable interest and attention. We provide the rst pub...
Mihir Bellare, Dennis Hofheinz, Scott Yilek
VLDB
2009
ACM
182views Database» more  VLDB 2009»
14 years 7 months ago
Guessing the extreme values in a data set: a Bayesian method and its applications
For a largenumber of data management problems, it would be very useful to be able to obtain a few samples from a data set, and to use the samples to guess the largest (or smallest)...
Mingxi Wu, Chris Jermaine
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 7 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
ICCAD
2008
IEEE
130views Hardware» more  ICCAD 2008»
14 years 4 months ago
Lightweight secure PUFs
— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potk...
CVPR
2010
IEEE
14 years 3 months ago
Learning from Interpolated Images using Neural Networks for Digital Forensics
Interpolated images have data redundancy, and special correlation exists among neighboring pixels, which is a crucial clue in digital forensics. We design a neural network based f...
Yizhen Huang, Na Fan