Sciweavers

427 search results - page 54 / 86
» Cryptanalysis of the
Sort
View
INFORMATICASI
2002
128views more  INFORMATICASI 2002»
13 years 7 months ago
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes
At PKC 2000, Inoue and Sakurai proposed some methods to design hash functions from block ciphers and codes (block codes and convolutional codes). They claimed that their hash func...
Hongjun Wu, Feng Bao, Robert H. Deng
JEI
2002
152views more  JEI 2002»
13 years 7 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 7 months ago
Cryptanalysis of the RSA-CEGD protocol
Recently, Nenadi
Juan M. Estévez-Tapiador, Almudena Alcaide,...
CANS
2010
Springer
159views Cryptology» more  CANS 2010»
13 years 6 months ago
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
Johannes Buchmann, Stanislav Bulygin, Jintai Ding,...