Sciweavers

923 search results - page 98 / 185
» Improved Slide Attacks
Sort
View
JCP
2010
100views more  JCP 2010»
15 years 2 months ago
Provable Secure Generalized Signcryption
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an encryption scheme, a signature scheme or a signcryption scheme [5]. However,the...
Xu An Wang, Xiaoyuan Yang, Jindan Zhang
ICIP
2001
IEEE
16 years 5 months ago
Geometric hashing techniques for watermarking
In this paper we introduce the idea of using Computer Vision techniques for improving and enhancing watermarking capabilities. Specifically, we incorporate Geometric Hashing techn...
Hagit Zabrodsky Hel-Or, Y. Yitzhaki, Yacov Hel-Or
ICIP
2000
IEEE
16 years 5 months ago
Image Watermarking with Better Resilience
We present schemes for hardeningimage watermarks against adversarial jamming. Our techniques improve upon standard correlation- and spread spectrum-based methods, and withstand va...
Ramarathnam Venkatesan, Mariusz H. Jakubowski
CHES
2007
Springer
105views Cryptology» more  CHES 2007»
15 years 10 months ago
On the Implementation of a Fast Prime Generation Algorithm
Abstract. A side-channel analysis of a cryptographic algorithm generally concentrates on the encryption or decryption phases, rarely on the key generation phase. In this paper, we ...
Christophe Clavier, Jean-Sébastien Coron
SACRYPT
2007
Springer
151views Cryptology» more  SACRYPT 2007»
15 years 10 months ago
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
The diversity of methods for fast collision search in SHA-1 and similar hash functions makes a comparison of them difficult. The literature is at times very vague on this issue, wh...
Christophe De Cannière, Florian Mendel, Chr...