Protection Against Forgeries-Photographic and Otherwise

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Forgeries and Distinguishers against PAES

We present two practical attacks on the CAESAR candidate PAES. The rst attack is a universal forgery for any plaintext with at least 240 bytes. It works for the nonce-repeating variant of PAES and in a nutshell it is a state recovery based on solving di erential equations for the S-Box leaked through the ciphertext that arise when the plaintext has a certain di erence. We show that to produce t...

متن کامل

Optimal Forgeries Against Polynomial-Based MACs and GCM

Polynomial-based authentication algorithms, such as GCM and Poly1305, have seen widespread adoption in practice. Due to their importance, a significant amount of attention has been given to understanding and improving both proofs and attacks against such schemes. At EUROCRYPT 2005, Bernstein published the best known analysis of the schemes when instantiated with PRPs, thereby establishing the m...

متن کامل

Therapeutic intragastric vaccination against Helicobacter pylori in mice eradicates an otherwise chronic infection and confers protection against reinfection.

Chronic infection of the gastroduodenal mucosae by the gram-negative spiral bacterium Helicobacter pylori is responsible for chronic active gastritis, peptic ulcers, and gastric cancers such as adenocarcinoma and low-grade gastric B-cell lymphoma. The success of eradication by antibiotic therapy is being rapidly hampered by the increasing occurrence of antibiotic-resistant strains. An attractiv...

متن کامل

Robustness of keystroke-dynamics based biometrics against synthetic forgeries

Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, we consider the effects of synthetic forgery attacks in the context...

متن کامل

Identities, forgeries and disguises

The preservation of your identity is a fundamental right. In many situations, you need to claim your identity and this claim needs to be verified somehow. The technology called biometrics may help. But, what if a deliberate impostor claims your identity? Will this forgery be always detected? Biometric identity verification is imperfect. This presentation will review some of the techniques that ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scientific American

سال: 1880

ISSN: 0036-8733

DOI: 10.1038/scientificamerican08071880-3828bsupp