Sciweavers

948 search results - page 87 / 190
» Attacking cryptographic schemes based on
Sort
View
ASIACRYPT
2009
Springer
14 years 2 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
DRM
2005
Springer
14 years 1 months ago
Improved watermark detection for spread-spectrum based watermarking using independent component analysis
This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the ...
Hafiz Malik, Ashfaq A. Khokhar, Rashid Ansari
PCM
2004
Springer
190views Multimedia» more  PCM 2004»
14 years 1 months ago
Mapping Energy Video Watermarking Algorithm Based on Compressed Domain
The paper presents a novel video watermarking scheme called Mapping Energy video Watermarking (MEW) for copyright protection. The watermark is embedded in the compressed domain and...
Lijun Wang, Hongxun Yao, Shaohui Liu, Wen Gao
ASIACRYPT
2001
Springer
14 years 18 days ago
Key-Privacy in Public-Key Encryption
We consider a novel security requirement of encryption schemes that we call “key-privacy” or “anonymity”. It asks that an eavesdropper in possession of a ciphertext not be ...
Mihir Bellare, Alexandra Boldyreva, Anand Desai, D...
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao