Sciweavers

859 search results - page 5 / 172
» The Changing Face of Cryptography
Sort
View
ISSAC
2007
Springer
132views Mathematics» more  ISSAC 2007»
14 years 22 days ago
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...
CIARP
2007
Springer
14 years 23 days ago
A Method for Estimating Authentication Performance over Time, with Applications to Face Biometrics
Underlying biometrics are biological tissues that evolve over time. Hence, biometric authentication (and recognition in general) is a dynamic pattern recognition problem. We propos...
Norman Poh, Josef Kittler, Raymond S. Smith, Jose ...
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
13 years 10 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
ISCI
2008
104views more  ISCI 2008»
13 years 6 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
CHES
1999
Springer
91views Cryptology» more  CHES 1999»
13 years 11 months ago
A High-Performance Flexible Architecture for Cryptography
Cryptographic algorithms are more efficiently implemented in custom hardware than in software running on general-purpose processors. However, systems which use hardware implementat...
R. Reed Taylor, Seth Copen Goldstein