Cryptography Reference
In-Depth Information
the 5th International Workshop on Information Hiding ,
pages 196-212, London, UK, 2003. Springer-Verlag.
[Aur95]
Tuomas Aura. Invisible communication. Technical
report, Helsinki University of Technology, November
1995.
[Bar88]
Michael F. Barnsley. Fractal modelling of real world im-
ages. InHeinz-OttoPeitgen and Dietmar Saupe, editors,
The Science of Fractal Images , chapter 5, pages 219-239.
Springer-Verlag, 1988.
[Bar93]
Michael F. Barnsley. Fractals Everywhere .Academic
Press, Cambridge, MA, USA, 2nd edition, 1993.
[BB00a]
Mihir Bellare and Alexandra Boldyreva. The security of
chaffing and winnowing. In ASIACRYPT , pages 517-530,
2000.
[BB00b]
Mihir Bellare and Alexandra Boldyreva. The security of
chaffing and winnowing. In ASIACRYPT '00: Proceed-
ings of the 6th International Conference on the Theory
and Application of Cryptology and Information Security ,
pages 517-530, London, UK, 2000. Springer-Verlag.
[BBWBG98] S. Blackburn, S. Blake-Wilson, M. Burmester, and S. Gal-
braith. Shared generation of shared rsa keys. Technical
Report CORR98-19, Department of Combinatorics and
Optimization, University of Waterloo, 1998.
[BC05]
Michael Backes and Christian Cachin. Public-key steg-
anography with active attacks. In Joe Kilian, editor,
TCC , volume 3378 of Lecture Notes in Computer Science ,
pages 210-226. Springer, 2005.
[BCK96a] Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Key-
ing hash functions for message authentication. Lecture
Notes in Computer Science , 1109:1-??, 1996.
[BCK96b] Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Mes-
sage authentication using hash functions: the HMAC
construction. CryptoBytes , 2(1):12-15, Spring 1996.
[Ben04]
Krista Bennett. Linguistic steganography: Survey, anal-
ysis, and robustness concerns for hiding information
in text. Research paper accepted in partial fulfillment
of the Dept. of Linguistics preliminary examination re-
quirement, 05 2004. CERIAS TR 2004-13.
Search WWH ::




Custom Search