Sciweavers

487 search results - page 20 / 98
» Integral Invariant Signatures
Sort
View
ETRICS
2006
14 years 1 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
13 years 7 months ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson
ICIP
2005
IEEE
14 years 11 months ago
Expression-invariant face recognition via spherical embedding
Recently, it was proven empirically that facial expressions can be modelled as isometries, that is, geodesic distances on the facial surface were shown to be significantly less se...
Alexander M. Bronstein, Michael M. Bronstein, Ron ...
AINA
2004
IEEE
14 years 1 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
EUROCRYPT
2006
Springer
14 years 1 months ago
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
Abstract. Lattice-based signature schemes following the GoldreichGoldwasser-Halevi (GGH) design have the unusual property that each signature leaks information on the signer's...
Phong Q. Nguyen, Oded Regev