Sciweavers

268 search results - page 43 / 54
» A Statistical Attack on RC6
Sort
View
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
14 years 19 days ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
ICICS
2003
Springer
14 years 18 days ago
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
In this paper, a digital video watermarking algorithm is proposed. We present a novel DWT-based blind digital video watermarking scheme with scrambled watermark and error correctin...
Pat Pik-Wah Chan, Michael R. Lyu
CCS
2006
ACM
13 years 11 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
CIS
2006
Springer
13 years 11 months ago
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....
Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao