Sciweavers

1898 search results - page 46 / 380
» Weak Keys for IDEA
Sort
View
DAC
1999
ACM
14 years 9 months ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...
DCC
2003
IEEE
14 years 8 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
MCAM
2007
Springer
127views Multimedia» more  MCAM 2007»
14 years 2 months ago
An Optimized Topology Maintenance Framework for P2P Media Streaming
In this paper, we present an optimized topology maintenance framework used in AVStreamer P2P media streaming system. To help new incoming clients get an initial view of the whole n...
Rui Guo, Longshe Huo, Qiang Fu, Shuangjia Chen, We...
FSE
2001
Springer
190views Cryptology» more  FSE 2001»
14 years 1 months ago
ZIP Attacks with Reduced Known Plaintext
Abstract. Biham and Kocher demonstrated that the PKZIP stream cipher was weak and presented an attack requiring thirteen bytes of plaintext. The deflate algorithm “zippers” no...
Michael Stay
DIAGRAMS
2008
Springer
13 years 10 months ago
What Can Pictorial Representations Reveal about the Cognitive Characteristics of Autism?
Abstract. In this paper, we develop a cognitive account of autism centered around a reliance on pictorial representations. This Thinking in Pictures hypothesis shows significant po...
Maithilee Kunda, Ashok K. Goel