نتایج جستجو برای: universal message

تعداد نتایج: 172516  

Journal: :Journal de la société des océanistes 2018

2014
Madhavi B. Desai S. V. Patel

Ooverwhelming growth in communication technology and usage of internet has greatly facilitated transfer of data. The threat of unauthorized data access is increasing along with it. Since last decade, too many data hiding methods have been proposed. Because of large number of redundant bits, image has become popular carrier for data hiding techniques. The advancement in image steganography has p...

2016
Alessandro Chiesa Matthew Green Jingcheng Liu Peihan Miao Ian Miers Pratyush Mishra

Micropayments (payments worth a few pennies) have numerous potential applications. A challenge in achieving them is that payment networks charge fees that are high compared to “micro” sums of money. Wheeler (1996) and Rivest (1997) proposed probabilistic payments as a technique to achieve micropayments: a merchant receives a macro-value payment with a given probability so that, in expectation, ...

Journal: :IACR Cryptology ePrint Archive 2013
Kazuhiko Minematsu

A new authenticated encryption (AE) mode for blockcipher is presented. The proposed scheme has attractive features for fast and compact operation. It requires rate-1 blockcipher call, and uses the encryption function of a blockcipher for both encryption and decryption. Moreover, the scheme enables one-pass, parallel operation under two-block partition. The proposed scheme thus attains similar c...

2002
Graham Steel Alan Bundy Ewen Denney

We present an implementation of a method for finding counterexamples to universally quantified conjectures in first-order logic. Our method uses the proof by consistency strategy to guide a search for a counterexample and a standard first-order theorem prover to perform a concurrent check for inconsistency. We explain briefly the theory behind the method, describe our implementation, and evalua...

2008
Peter Brezany Michael Gerndt

Vienna Fortran, a machine-independent language extension to Fortran which allows the user to write programs for distributed-memory systems using global addresses, provides the forall loop construct for specifying irregular computations that do not cause inter-iteration dependences. Compilers for distributed-memory systems cannot generate eecient code for such loops using compile-time techniques...

2009
Aniket Kate Ian Goldberg David R. Cheriton

This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed DiffieHellman values, pairing-based onion routing, and certificateless o...

2012
James Mayfield Timothy W. Finin

The steady progress of information extraction systems has been helped by sound methodologies for evaluating their performance in controlled experiments. Annual events like MUC, ACE and TAC have developed evaluation approaches enabling researchers to score and rank their systems relative to reference results. Yet these evaluations have only assessed component technologies needed by a knowledge b...

Journal: :IEEE Transactions on Information Theory 2022

We derive universal classical-quantum superposition coding and multiple access channel by using generalized packing lemmas for the type method. Using our code, we establish capacity region of a compound broadcast with degraded message sets. Our codes have two types codes. One is code joint decoding other separate decoding. It not so easy to construct former that universally achieves general poi...

2004
Kaan Yüksel Jens-Peter Kaps Berk Sunar

Message Authentication Codes (MACs) are a valuable tool for ensuring the integrity of messages. MACs may be built around a keyed hash function. In this paper, we propose three variations on NH (a universal hash function explored in UMAC [1]), namely PH, PR and WH. Our main motivation was to prove that universal hash functions can be employed to provide provable security in ultra-low-power appli...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید