Sciweavers

985 search results - page 82 / 197
» On the validity of digital signatures
Sort
View
NORDSEC
2009
Springer
14 years 1 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
PCM
2009
Springer
180views Multimedia» more  PCM 2009»
14 years 1 months ago
RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization
Abstract. In this paper, we propose an image moment-based geometric normalization to be applied before embedding and extracting a digital watermark in the DWT-domain of JPEG2000. A...
Mathias Schlauweg, Erika Müller
EUROCRYPT
2001
Springer
14 years 1 months ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin
AC
1997
Springer
14 years 1 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
DATE
2009
IEEE
118views Hardware» more  DATE 2009»
14 years 25 days ago
Variation resilient adaptive controller for subthreshold circuits
Subthreshold logic is showing good promise as a viable ultra-low-power circuit design technique for powerlimited applications. For this design technique to gain widespread adoption...
Biswajit Mishra, Bashir M. Al-Hashimi, Mark Zwolin...