[[abstract]]In 2007, Kim et al. proposed a secure compression code called the Secure Arithmetic Code (SAC). The code was claimed to be secure against chosen plaintext attacks. However, we find that the SAC is not as secure as the authors have claimed. In this paper, we show the code is prone to two attacks. The first attack completely breaks the code using an adaptive chosen plaintext attack with a polynomial number of queries. The second attack is a ciphertext-only attack, which removes a part of the output permutation.[[fileno]]2030230010091[[department]]資訊工程學
We consider a public and keyless code (Enc,Dec) which is used to encode a message m and derive a cod...
improve the security in two methods are: RAC (Randomized Arithmetic Coding) and KSAC (AC with Key-ba...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
The paper "Secure Arithmetic Coding" (in IEEE TRANSACTIONS ON SIGNAL PROCESSING, vol. 55, no. 5, pp....
This thesis examines a variety of arithmetic coding encryption schemes proposed in existing literatu...
This work investigates the security issues of the recently proposed secure arithmetic coding (AC), w...
Arithmetic coding is a technique which converts a given probability distribution into an optimal cod...
Image processing is of growing interest in computer applications. Since the size of image files are ...
We ask whether two or more images of arithmetic may inhabit the same space via different encodings. ...
[[abstract]]Recently, Alencar et al. proposed a private-key encryption scheme based on the use of bu...
Amalgamation of compression and security is indispensable in the field of multimedia applications. A...
Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear...
This paper studies the joint security and performance enhancement of secure arithmetic coding (AC) f...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
arithmetic coding, which has led to increased interest in arithmetic coding in the context of image/...
We consider a public and keyless code (Enc,Dec) which is used to encode a message m and derive a cod...
improve the security in two methods are: RAC (Randomized Arithmetic Coding) and KSAC (AC with Key-ba...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
The paper "Secure Arithmetic Coding" (in IEEE TRANSACTIONS ON SIGNAL PROCESSING, vol. 55, no. 5, pp....
This thesis examines a variety of arithmetic coding encryption schemes proposed in existing literatu...
This work investigates the security issues of the recently proposed secure arithmetic coding (AC), w...
Arithmetic coding is a technique which converts a given probability distribution into an optimal cod...
Image processing is of growing interest in computer applications. Since the size of image files are ...
We ask whether two or more images of arithmetic may inhabit the same space via different encodings. ...
[[abstract]]Recently, Alencar et al. proposed a private-key encryption scheme based on the use of bu...
Amalgamation of compression and security is indispensable in the field of multimedia applications. A...
Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear...
This paper studies the joint security and performance enhancement of secure arithmetic coding (AC) f...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
arithmetic coding, which has led to increased interest in arithmetic coding in the context of image/...
We consider a public and keyless code (Enc,Dec) which is used to encode a message m and derive a cod...
improve the security in two methods are: RAC (Randomized Arithmetic Coding) and KSAC (AC with Key-ba...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...