Cryptography Reference
In-Depth Information
[FBS96]
J. Fridrich, Arnold Baldoza, and Richard Simard. Ro-
bust digital watermaking based on key-dependent ba-
sis functions. In Information Hiding Workshop, Lecture
Notes of Computer Science (1525) , NewYork, Heidelberg,
1996. Springer-Verlag.
[FD99]
J. Fridrich and Rui Dui. Secure steganographic meth-
ods for palette images. In 3rd InformationHiding Work-
shop, Lecture Notes of Computer Science (1768) ,New
York, Heidelberg, 1999. Springer-Verlag.
[FDL00]
J. Fridrich, Rui Du, and Meng Long. Steganalysis of LS-
Bencoding in color images. In Proceedings of the IEEE
International Conference on Multimedia and Expo ,Au-
gust 2000.
[FG99]
J. Fridrich and M. Goljan. Protection of digital images
using self embedding. In Proceedings of NJIT Sympo-
sium on Content Security and Data Hiding in Digital
Media , Newark, NJ, May 1999.
[FGLS05]
Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, and
David Soukal. Writing on wet paper. In Delp and Wong
[DW05], pages 328-340.
[FGS04]
Jessica Fridrich, Miroslav Goljan, and David Soukal.
Perturbed quantization steganography with wet paper
codes. In MM&Sec '04: Proceedings of the 2004 work-
shop onMultimedia and security , pages 4-15, New York,
NY, USA, 2004. ACM.
[FLN07]
Pierre-Alain Fouque, Gaetan Leurent, and Phong Q.
Nguyen. Full key-recovery attacks on HMAC/NMAC-
MD4 and NMAC-MD5. In Proc. CRYPTO '07 ,volume
4622 of Lecture Notes in Computer Science , pages 13-30.
Springer, 2007.
[FMY98]
Yair Frankel, Philip D. MacKenzie, and Moti Yung. Ro-
bust efficient distributed RSA-key generation. In Sym-
posium on Principles of Distributed Computing ,page
320, 1998.
[FOO93]
A. Fujioka, T. Okamoto, and K. Ohta. A practical se-
cret voting scheme for large scale elections. In Advances
in Cryptology-AUSCRYPT '92 Proceedings .Springer-
Verlag, 1993.
Search WWH ::




Custom Search