Sciweavers

63 search results - page 12 / 13
» Attacking the Knudsen-Preneel Compression Functions
Sort
View
134
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
Security/Efficiency Tradeoffs for Permutation-Based Hashing
We provide attacks and analysis that capture a tradeoff, in the ideal-permutation model, between the speed of a permutation-based hash function and its potential security. For coll...
Phillip Rogaway, John P. Steinberger
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
15 years 8 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
VISUALIZATION
1998
IEEE
15 years 8 months ago
Image-based rendering with occlusions via cubist images
We attack the problem of image-based rendering with occlusions and general camera motions by using distorted multiperspective images; such images provide multiple-viewpoint photom...
Andrew J. Hanson, Eric A. Wernert
ISPEC
2009
Springer
15 years 10 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Robust Watermarking in the Wigner Domain
In this paper, a new watermarking scheme in the joint timefrequency domain is introduced. Wigner distribution is used to transform an image into the spatial-spectral domain. The p...
Mahmood Al-khassaweneh, Selin Aviyente