Sciweavers

530 search results - page 50 / 106
» Practical Threshold Signatures
Sort
View
ASIACRYPT
2000
Springer
14 years 9 days ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
JCP
2007
88views more  JCP 2007»
13 years 7 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
ICPR
2006
IEEE
14 years 9 months ago
Event Recognition with Fragmented Object Tracks
Complete and accurate video tracking is very difficult to achieve in practice due to long occlusions, traffic clutter, shadows and appearance changes. In this paper, we study the ...
Anthony Hoogs, Gianfranco Doretto, John Schmiedere...
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 8 months ago
Exchange of Limits: Why Iterative Decoding Works
We consider communication over a family of binary-input memoryless output-symmetric channels using lowdensity parity-check codes under message passing decoding. The asymptotic (in ...
Satish Babu Korada, Rüdiger L. Urbanke
LOPSTR
2007
Springer
14 years 2 months ago
Type-Based Homeomorphic Embedding and Its Applications to Online Partial Evaluation
Homeomorphic Embedding (HEm) has proven to be very powerful for supervising termination of computations, provided that such computations are performed over a finite signature, i.e...
Elvira Albert, John P. Gallagher, Miguel Gó...