Sciweavers

51 search results - page 5 / 11
» aes 2006
Sort
View
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
13 years 11 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
13 years 11 months ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
ICIP
2006
IEEE
14 years 9 months ago
Selective Encryption of Human Skin in JPEG Images
In this study we propose a new approach for selective encryption in the Huffman coding of the Discrete Cosine Transform (DCT) coefficients using the Advanced Encryption Standard (...
Adrian G. Bors, José M. Rodrigues, William ...
ISM
2006
IEEE
150views Multimedia» more  ISM 2006»
14 years 1 months ago
Blind Detection for Additive Embedding Using Underdetermined ICA
This paper presents an efficient blind watermark detection scheme for additive embedding (AE) based on underdetermined independent component analysis (ICA) framework. The propose...
Hafiz Malik, Ashfaq A. Khokhar, Rashid Ansari, Mar...
JOT
2006
75views more  JOT 2006»
13 years 7 months ago
Encrypting the Java Serialized Object
The cryptographic classes incorporated into Sun's releases of the Java Virtual Machine are often used in e-commerce and other applications. A mechanism exists for signing a J...
Alan Ward