Sciweavers

429 search results - page 35 / 86
» Permutative Additives and Exponentials
Sort
View
ASIACRYPT
2009
Springer
14 years 2 months ago
Rebound Attack on the Full Lane Compression Function
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear messag...
Krystian Matusiewicz, María Naya-Plasencia,...
ICICS
2009
Springer
14 years 2 months ago
Secure Remote Execution of Sequential Computations
Abstract. We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contributi...
Ghassan Karame, Mario Strasser, Srdjan Capkun
ICIP
2008
IEEE
14 years 2 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
LICS
2007
IEEE
14 years 2 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam
CIARP
2005
Springer
14 years 1 months ago
Non-supervised Classification of 2D Color Images Using Kohonen Networks and a Novel Metric
We describe the application of 1-Dimensional Kohonen Networks in the classification of color 2D images which has been evaluated in Popocatépetl Volcano’s images. The Popocatépe...
Ricardo Pérez-Aguila, Pilar Gómez-Gi...