Sciweavers

506 search results - page 82 / 102
» The Block Cipher Square
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 3 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 2 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
IH
1998
Springer
14 years 2 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
14 years 1 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
ICMCS
2006
IEEE
129views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Directional Discrete Cosine Transforms for Image Coding
- Nearly all block-based transform schemes for image and video coding developed so far choose the 2-D discrete cosine transform (DCT) of a square block shape. With almost no except...
Bing Zeng, Jingjing Fu