Sciweavers

517 search results - page 73 / 104
» Adaptive Threshold Masking
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
ITC
1997
IEEE
107views Hardware» more  ITC 1997»
14 years 1 months ago
On-Chip Measurement of the Jitter Transfer Function of Charge-Pump Phase-Locked Loops
- An all-digital technique for the measurement of the jitter transfer function of charge-pump phase-locked loops is introduced. Input jitter may be generated using one of two metho...
Benoît R. Veillette, Gordon W. Roberts
ICSAP
2010
14 years 1 months ago
The Effect of Subcarrier-Based Channel Estimation on the BER Bound of Turbo Coded OFDM/SDMA System
—In this paper, we study the performance of the channel estimation in a Turbo coded, orthogonal frequency division multiplexing (OFDM) with multiple antennas at the receiver. We ...
Y. Taghinia, Gholamreza Dadashzadeh, Esrafil Jedar...
DSN
2004
IEEE
14 years 1 months ago
A Framework for Dynamic Byzantine Storage
We present a framework for transforming several quorum-based protocols so that they can dynamically adapt their failure threshold and server count, allowing them to be reconfigure...
Jean-Philippe Martin, Lorenzo Alvisi
CIS
2006
Springer
14 years 1 months ago
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....
Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko