Results 41 to 49 of about 115 (49)
Using shifted conjugacy in braid-based cryptography
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core +1 more source
A New Watermarking Algorithm Based on Human Visual System for Content Integrity Verification of Region of Interest [PDF]
This paper proposes a semi-fragile, robust-to-JPEG2000 compression watermarking method which is based on the Human Visual System (HVS). This method is designed to verify the content integrity of Region of Interest (ROI) in tele-radiology images.
Fatemizadeh, Emad, Maneshi, Mona
core +1 more source
Minimal Linear Codes Constructed from Sunflowers. [PDF]
Wu X, Lu W.
europepmc +1 more source
Probabilistic Infinite Secret Sharing
The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes.
Csirmaz, László
core
Sum graph based access structure in a secret sharing scheme [PDF]
Secret sharing scheme is a method to distribute secret information to a set P of participants so that only authorised subsets of P can reconstruct the secret.
Miller, Mirka +2 more
core +1 more source
On the information ratio of graphs with many leaves [PDF]
Gyarmati, Máté, Ligeti, Péter
core +1 more source
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc +1 more source
A case study in almost-perfect security for unconditionally secure communication [PDF]
core +1 more source

