Sciweavers

948 search results - page 22 / 190
» Attacking cryptographic schemes based on
Sort
View
ICMCS
2009
IEEE
139views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Compressed-domain temporal adaptation-resilient watermarking for H.264 video authentication
In this paper we present a DCT domain watermarking approach for H.264/AVC video coding standard. This scheme is resilient to compressed-domain temporal adaptation. A cryptographic...
Sharmeen Shahabuddin, Razib Iqbal, Shervin Shirmoh...
EUROCRYPT
2009
Springer
14 years 8 months ago
Order-Preserving Symmetric Encryption
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database community by Agrawal et al. (SIGMOD '04) for allowin...
Alexandra Boldyreva, Nathan Chenette, Younho Lee, ...
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
14 years 1 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
IEEECIT
2005
IEEE
14 years 1 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 7 months ago
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy si...
Tianjie Cao, Xianping Mao