Sciweavers

400 search results - page 14 / 80
» codes 2001
Sort
View
87
Voted
ICICS
2001
Springer
15 years 6 months ago
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
Abstract. In this paper, the cryptanalytic strength of two HwangRao Secret Error-Correcting Code (SECC) schemes is examined under a known-plaintext attack. In particular, we found ...
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
DCC
2001
IEEE
16 years 1 months ago
Weierstrass Pairs and Minimum Distance of Goppa Codes
We prove that elements of the Weierstrass gap set of a pair of points may be used to define a geometric Goppa code which has minimum distance greater than the usual lower bound. We...
Gretchen L. Matthews
WEBNET
1997
15 years 3 months ago
MiMi: A Java Implementation of the MicroMint Scheme
In this paper we describe an experimental implementation of the MicroMint micropayment scheme in Java. We apply this scheme to purchasing Web pages. A prerequisite was to accompli...
Vesna Hassler, Robert Bihlmeyer, Michael Fischer, ...
TC
1998
15 years 2 months ago
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP
Abstract—A widely used bus-encryption microprocessor is vulnerable to a new practical attack. This type of processor decrypts onthe-fly while fetching code and data, which are st...
Markus G. Kuhn
VCIP
2000
146views Communications» more  VCIP 2000»
15 years 3 months ago
Novel video coding scheme using adaptive mesh-based interpolation and node tracking
An alternative method to H.263 for encoding of moving images at bit rates below 64 kbit/s is presented using adaptive spatial subsampling, mesh based interpolation and node tracki...
Eckhart Baum, Joachim Speidel