Sciweavers

963 search results - page 37 / 193
» Conditional Digital Signatures
Sort
View
IH
2004
Springer
14 years 2 months ago
Statistical Tools for Digital Forensics
A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longe...
Alin C. Popescu, Hany Farid
FOSSACS
2001
Springer
14 years 1 months ago
On the Modularity of Deciding Call-by-Need
In a recent paper we introduced a new framework for the study of call by need computations. Using elementary tree automata techniques and ground tree transducers we obtained simple...
Irène Durand, Aart Middeldorp
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 3 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
FPL
2008
Springer
131views Hardware» more  FPL 2008»
13 years 10 months ago
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
Tim Güneysu, Christof Paar, Gerd Pfeiffer, Ma...
ATS
2010
IEEE
261views Hardware» more  ATS 2010»
13 years 6 months ago
The Test Ability of an Adaptive Pulse Wave for ADC Testing
In the conventional ADC production test method, a high-quality analogue sine wave is applied to the Analogue-toDigital Converter (ADC), which is expensive to generate. Nowadays, an...
Xiaoqin Sheng, Hans G. Kerkhoff