Sciweavers

868 search results - page 36 / 174
» The EAX Mode of Operation
Sort
View
ISCAS
2002
IEEE
114views Hardware» more  ISCAS 2002»
14 years 9 days ago
Lossless, near-lossless and lossy adaptive coding based on the lossless DCT
This report proposes a new coding method, which realizes lossless, near-lossless and lossy coding with a unified single algorithm. The method is based on a lifting-structured loss...
Somchart Chokchaitam, Masahiro Iwahashi
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. The paradigm involves composing an all-or-nothing...
Anand Desai
GECCO
2011
Springer
247views Optimization» more  GECCO 2011»
12 years 11 months ago
An agent-based model of the effects of a primate social structure on the speed of natural selection
The rate of speciation is in most mammals an order of magnitude faster than in most other vertebrates. It is faster still in the social mammals. The apparent association between c...
Gideon M. Gluckman, Joanna Bryson
IACR
2011
88views more  IACR 2011»
12 years 7 months ago
GCM, GHASH and Weak Keys
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...
Markku-Juhani O. Saarinen

Publication
715views
15 years 7 months ago
A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desire...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu