Cryptography Reference
In-Depth Information
[FBS96]
J. Fridrich, Arnold Baldoza, and Richard Simard. Ro-
bust digital watermaking based on key-dependent ba-
sis functions. In
Information Hiding Workshop, Lecture
Notes of Computer Science (1525)
, NewYork, Heidelberg,
1996. Springer-Verlag.
[FD99]
J. Fridrich and Rui Dui. Secure steganographic meth-
ods for palette images. In
3rd InformationHiding Work-
shop, Lecture Notes of Computer Science (1768)
,New
York, Heidelberg, 1999. Springer-Verlag.
[FDL00]
J. Fridrich, Rui Du, and Meng Long. Steganalysis of LS-
Bencoding in color images. In
Proceedings of the IEEE
International Conference on Multimedia and Expo
,Au-
gust 2000.
[FG99]
J. Fridrich and M. Goljan. Protection of digital images
using self embedding. In
Proceedings of NJIT Sympo-
sium on Content Security and Data Hiding in Digital
Media
, Newark, NJ, May 1999.
[FGLS05]
Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, and
David Soukal. Writing on wet paper. In Delp and Wong
[DW05], pages 328-340.
[FGS04]
Jessica Fridrich, Miroslav Goljan, and David Soukal.
Perturbed quantization steganography with wet paper
codes. In
MM&Sec '04: Proceedings of the 2004 work-
shop onMultimedia and security
, pages 4-15, New York,
NY, USA, 2004. ACM.
[FLN07]
Pierre-Alain Fouque, Gaetan Leurent, and Phong Q.
Nguyen. Full key-recovery attacks on HMAC/NMAC-
MD4 and NMAC-MD5. In
Proc. CRYPTO '07
,volume
4622 of
Lecture Notes in Computer Science
, pages 13-30.
Springer, 2007.
[FMY98]
Yair Frankel, Philip D. MacKenzie, and Moti Yung. Ro-
bust efficient distributed RSA-key generation. In
Sym-
posium on Principles of Distributed Computing
,page
320, 1998.
[FOO93]
A. Fujioka, T. Okamoto, and K. Ohta. A practical se-
cret voting scheme for large scale elections. In
Advances
in Cryptology-AUSCRYPT '92 Proceedings
.Springer-
Verlag, 1993.