Cryptography Reference
In-Depth Information
[Fou98]
Electronic Frontier Foundation. Cracking DES :Secrets
of Encryption Research, Wiretap Politics and Chip De-
sign . O'Reilly, 1998.
[Fra05]
Michael P. Frank. Introduction to reversible computing:
motivation, progress, and challenges. In Bagherzadeh
et al. [BVR05], pages 385-390.
[Fre82]
Ed Fredkin. Conservative logic. International Journal of
Theoretical Physics , 21, 1982.
[Fri99]
J. Fridrich. A new steganographic method for palette-
based images. In Proceedings of the IS&T PICS Confer-
ence , pages 285-289, Savannah, Georgia, April 1999.
[Fri04]
Jessica J. Fridrich. Feature-based steganalysis for jpeg
images and its implications for future design of stega-
nographic schemes. In Jessica J. Fridrich, editor, Infor-
mation Hiding , volume 3200 of Lecture Notes in Com-
puter Science , pages 67-81. Springer, 2004.
[FT82 ]
Edward Fredk in and Tommaso Tof fo l i . Conser vat i ve
logic. International Journal of Theoretical Physics ,
21:219-253, 1982.
[Fun06]
Wolfgang Funk. Reversible watermarking of nurbs-
based cad models. In Camenisch et al. [CCJS07], pages
172-187.
[GB98]
Daniel Gruhl and Walter Bender. Information hiding
to foil the casual counterfeiter. In Information Hid-
ing Workshop, Lecture Notes of Computer Science (1525) ,
New York, Heidelberg, 1998. Springer-Verlag.
[GCC88]
Marc Girault, Robert Cohen, and Mireille Campana.
A generalized birthday attack.
In EUROCRYPT ,pages
129-156, 1988.
[GJ79]
Michael R. Garey and David S. Johnson. Comput-
ers and Intractability: A Guide to the Theory of NP-
Completeness . W.H. Freeman and Company, New York
City, New York, 1979.
[GJ04]
Philippe Golle and Ari Juels. Dining cryptographers re-
visited. In Proceedings of Eurocrypt 2004 , May 2004.
Search WWH ::




Custom Search