Sciweavers

583 search results - page 83 / 117
» On the Complexity of Matsui's Attack
Sort
View
ERSA
2009
109views Hardware» more  ERSA 2009»
13 years 6 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
ICIP
2009
IEEE
13 years 6 months ago
Spatial self-synchronizing video watermarking technique
There are various traditional video watermarking schemes robust to geometrical transformations. Most of them use synchronizing techniques or invariant transforms to resist geometr...
Tae-Woo Oh, Min-Jeong Lee, Kyung-Su Kim, Young-Suk...
ICASSP
2011
IEEE
13 years 5 days ago
Towards improving network flow watermarks using the repeat-accumulate codes
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
Amir Houmansadr, Nikita Borisov
FSE
2011
Springer
218views Cryptology» more  FSE 2011»
12 years 12 months ago
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to fou...
Jérémy Jean, Pierre-Alain Fouque
IACR
2011
124views more  IACR 2011»
12 years 8 months ago
Zero-Correlation Linear Cryptanalysis of Block Ciphers
Linear cryptanalysis, along with differential cryptanalysis, is an important tool to evaluate the security of block ciphers. This work introduces a novel extension of linear crypt...
Andrey Bogdanov, Vincent Rijmen