搜索结果: 1-5 共查到“军事学 images”相关记录5条 . 查询时间(0.296 秒)
Faster Algorithms for Isogeny Problems using Torsion Point Images
isogeny-based cryptography cryptanalysis
2017/6/15
There is a recent trend in cryptography to construct protocols based on the hardness of computing isogenies between supersingular elliptic curves. Two prominent examples are Jao-De Feo's key exchange ...
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
Cold-boot attacks decayed memory SAT solvers
2010/7/13
Cold boot attack is a side channel attack which exploits the data remanence property of random access memory (RAM) to retrieve its contents which remain readable shortly after its power has been remov...
A New Chaos-Based Cryptosystem for Secure Transmitted Images
Chaos-based cryptosystem perturbed technique error propagation
2010/2/1
This paper presents a novel and robust chaos-based cryptosystem for secure transmitted images and four others versions. In the proposed block encryption/decryption algorithms, an 2D chaotic map is use...
On the Security of a Visual Cryptography Scheme for Color Images
visual cryptography secret sharing dithering
2009/6/4
In Pattern Recognition, vol. 36, 2003, Hou proposed a four-share visual cryptography
scheme for color images. The scheme splits a secret image into four shares, the black mask and
the other three sh...
Secret color images sharing schemes based on XOR operation
Secret color images sharing schemes XOR operation
2009/3/11
Secret color images sharing schemes based on XOR operation.