Sciweavers

555 search results - page 34 / 111
» From ABZ to Cryptography
Sort
View
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
14 years 2 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
EUROCRYPT
2003
Springer
14 years 3 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
TCC
2009
Springer
146views Cryptology» more  TCC 2009»
14 years 10 months ago
An Optimally Fair Coin Toss
We address one of the foundational problems in cryptography: the bias of coin-flipping protocols. Coin-flipping protocols allow mutually distrustful parties to generate a common u...
Tal Moran, Moni Naor, Gil Segev
ESORICS
2002
Springer
14 years 9 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
CSE
2009
IEEE
14 years 4 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...