Sciweavers

110 search results - page 8 / 22
» Chinese Remaindering with Errors
Sort
View
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
13 years 9 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
COCO
2006
Springer
88views Algorithms» more  COCO 2006»
13 years 9 months ago
Polynomial Identity Testing for Depth 3 Circuits
We study the identity testing problem for depth 3 arithmetic circuits ( circuit). We give the first deterministic polynomial time identity test for circuits with bounded top fanin...
Neeraj Kayal, Nitin Saxena
VCIP
2003
153views Communications» more  VCIP 2003»
13 years 8 months ago
Flexible authentication of images
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility ...
Yanjiang Yang, Feng Bao, Robert H. Deng
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
13 years 8 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 7 months ago
Construction and Applications of CRT Sequences
Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the p...
Kenneth W. Shum, Wing Shing Wong