Search

Search Results

Showing 1-5 of 5 results
  1. Conference paper

    Protecting Medical Images with Biometric Information

    Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital...
    Marcelo Fornazin, Danilo B.S. Netto, ... Aparecido N. Marana in Advances in Computer and Information Sciences and Engineering
    2008
  2. Conference paper

    LFSR Based Stream Ciphers Are Vulnerable to Power Attacks

    Linear Feedback Shift Registers (LFSRs) are used as building blocks for many stream ciphers, wherein, an n-degree primitive connection polynomial is...
    Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan in Progress in Cryptology – INDOCRYPT 2007
    2007
  3. Conference paper

    Cryptanalysis Based on 2-Adic Rational Approximation

    This paper presents a new algorithm for cryptanalytically attacking stream ciphers. There is an associated measure of security, the 2-adic span. In...
    Andrew Klapper, Mark Goresky in Advances in Cryptology — CRYPT0’ 95
    1995
  4. Conference paper

    On the Linear Span of Binary Sequences Obtained from Finite Geometries

    A class of periodic binary sequences that are obtained from the incidence vectors of hyperplanes in finite geometries is defined, and a general...
    Agnes Hui Chan, Richard A. Games in Advances in Cryptology — CRYPTO’ 86
    1987
Did you find what you were looking for? Share feedback.