Sciweavers

488 search results - page 27 / 98
» Policy-Based Cryptography and Applications
Sort
View
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
14 years 1 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent
FC
2004
Springer
120views Cryptology» more  FC 2004»
14 years 24 days ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
MM
2000
ACM
112views Multimedia» more  MM 2000»
13 years 11 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
ARITH
2001
IEEE
13 years 11 months ago
The Use of the Multi-Dimensional Logarithmic Number System in DSP Applications
A recently introduced double-base number representation has proved to be successful in optimizing the performance of several algorithms in cryptography and digital signal processi...
Vassil S. Dimitrov, Jonathan Eskritt, Laurent Imbe...
SAC
2006
ACM
14 years 1 months ago
Induction of compact decision trees for personalized recommendation
We propose a method for induction of compact optimal recommendation policies based on discovery of frequent itemsets in a purchase database, followed by the application of standar...
Daniel Nikovski, Veselin Kulev