Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Digital watermarking is envisaged as a potential technology for copyright protection and manipulation recognition. A key issue in the usage of robust watermarking is the evaluatio...
Jana Dittmann, Martin Steinebach, Andreas Lang, Sa...