In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
— A new method is presented to test dynamic parameters of Analogue-to-Digital Converters (ADC). A noisy and nonlinear pulse is applied as the test stimulus, which is suitable for...
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Research has been active in thefield offorgeiy detection, but relatively little work has been done on the detection of skilled forgeries. In thispaper, we present an algorithmfor ...
Jinhong Katherine Guo, David S. Doermann, Azriel R...
Abstract. We match shapes, even under severe deformations, via a smooth reparametrization of their integral invariant signatures. These robust signatures and correspondences are th...
Siddharth Manay, Daniel Cremers, Anthony J. Yezzi,...