Sciweavers

948 search results - page 64 / 190
» Attacking cryptographic schemes based on
Sort
View
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
13 years 12 months ago
Proposal of a Signature Scheme Based on STS Trapdoor
A New digital signature scheme based on Stepwise Triangular Scheme (STS) is proposed. The proposed trapdoor has resolved the vulnerability of STS and secure against both Gr¨obner ...
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, ...
ISPEC
2009
Springer
14 years 2 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
APNOMS
2009
Springer
14 years 2 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
ISW
2000
Springer
13 years 11 months ago
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients
Generally, low frequency domain may be useful to embed a watermark in an image. However, if a watermark is embedded into low frequency components, blocking effects may occur in the...
Minoru Kuribayashi, Hatsukazu Tanaka
INFORMATICALT
2007
119views more  INFORMATICALT 2007»
13 years 8 months ago
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce t...
Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huan...