Sciweavers

773 search results - page 33 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
3DIM
2011
IEEE
12 years 9 months ago
Stereo Reconstruction of Building Interiors with a Vertical Structure Prior
—Image-based computation of a 3D map for an indoor environment is a very challenging task, but also a useful step for vision-based navigation and path planning for autonomous sys...
Bernhard Zeisl, Christopher Zach, Marc Pollefeys
IACR
2011
82views more  IACR 2011»
12 years 9 months ago
Wild McEliece Incognito
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of se...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 10 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
ICCSA
2009
Springer
14 years 4 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
ICICS
2009
Springer
14 years 4 months ago
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
Abstract. We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear err...
Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Jos...