Sciweavers

490 search results - page 29 / 98
» Equivalent Keys of HPC
Sort
View
ICIP
2009
IEEE
14 years 9 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
SETA
2004
Springer
122views Mathematics» more  SETA 2004»
14 years 2 months ago
New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP)
In order to reduce key sizes and bandwidth, cryptographic systems have been proposed using minimal polynomials to represent finite field elements. These systems are essentially e...
Kenneth J. Giuliani, Guang Gong
BIRTHDAY
2008
Springer
13 years 10 months ago
Models of Computation: A Tribute to Ugo Montanari's Vision
e [43] is the first paper on final, observational semantics in abstract data types, and the main reference for one of the MoC contributed papers in this volume. It presented severa...
Roberto Bruni, Vladimiro Sassone
SMA
2009
ACM
166views Solid Modeling» more  SMA 2009»
14 years 3 months ago
A geometric criterion for smooth interpolation of curve networks
A key problem when interpolating a network of curves occurs at vertices: an algebraic condition called the vertex enclosure constraint must hold wherever an even number of curves ...
T. Hermann, J. Peters, T. Strotman
CRYPTO
1992
Springer
156views Cryptology» more  CRYPTO 1992»
14 years 23 days ago
DES is not a Group
We prove that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. This implies that, in general, multiple DES-encry...
Keith W. Campbell, Michael J. Wiener