Sciweavers

143 search results - page 14 / 29
» Hash, Displace, and Compress
Sort
View
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
14 years 1 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
IACR
2011
162views more  IACR 2011»
12 years 7 months ago
The Parazoa Family: Generalizing the Sponge Hash Functions
Abstract. Sponge functions were introduced by Bertoni et al. as an alternative to the classical MerkleDamg˚ard design. Many hash function submissions to the SHA-3 competition laun...
Elena Andreeva, Bart Mennink, Bart Preneel
JCSS
2010
91views more  JCSS 2010»
13 years 5 months ago
Content-dependent chunking for differential compression, the local maximum approach
When a file is to be transmitted from a sender to a recipient and when the latter already has a file somewhat similar to it, remote differential compression seeks to determine t...
Nikolaj Bjørner, Andreas Blass, Yuri Gurevi...
ICASSP
2011
IEEE
12 years 11 months ago
Dense disparity estimation from linear measurements
This paper proposes a methodology to estimate the correlation model between a pair of images that are given under the form of linear measurements. We consider an image pair whose ...
Vijayaraghavan Thirumalai, Pascal Frossard
ICIP
2007
IEEE
14 years 9 months ago
Motion-Based Geometry Compensation for DWT Compression of 3D mesh Sequences
In this paper, We propose an efficient compression method to encode the geometry of 3D mesh sequences of objects sharing the same connectivity. Our approach is based on the cluste...
Yasmine Boulfani-Cuisinaud, Marc Antonini