Sciweavers

1273 search results - page 107 / 255
» Recovery from
Sort
View
IACR
2011
149views more  IACR 2011»
12 years 8 months ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
ICIP
2010
IEEE
13 years 5 months ago
Filterbank-based universal demosaicking
Recent advances in spatio-spectral sampling and panchromatic pixels have contributed to increased spatial resolution and enhanced noise performance. As such, it is necessary to co...
Jing Gu, Patrick J. Wolfe, Keigo Hirakawa
ASIACRYPT
2008
Springer
13 years 10 months ago
Slide Attacks on a Class of Hash Functions
This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they ...
Michael Gorski, Stefan Lucks, Thomas Peyrin
ICASSP
2011
IEEE
12 years 12 months ago
Denoising of image patches via sparse representations with learned statistical dependencies
We address the problem of denoising for image patches. The approach taken is based on Bayesian modeling of sparse representations, which takes into account dependencies between th...
Tomer Faktor, Yonina C. Eldar, Michael Elad
ICIP
2008
IEEE
14 years 10 months ago
A video Time Encoding Machine
Time encoding is a real-time asynchronus mechanism of mapping analog amplitude information into multidimensional time sequences. We investigate the exact representation of analog ...
Aurel A. Lazar, Eftychios A. Pnevmatikakis