Cryptography Reference
In-Depth Information
[Kob87]
Neal Koblitz. A Course in Number Theory and Cryptog-
raphy . Springer-Verlag, New York, Berlin, Heidelberg,
London, Paris, Tokyo, 1987.
[Kom95]
John Kominek. Convergence of fractal encoded images.
In J. A. Storer and M. Cohn, editors, Data Compression
Conference 1995 , pages 242-251, Snowbird, UT, USA,
March 1995.
[KQP01]
Farinaz Koushanfar, Gang Qu, and Miodrag Potkonjak.
Intellectual property metering. In Fourth Information
Hiding Workshop , 2001.
[Kra94]
Hugo Krawczyk. Secret sharing made short. In CRYPTO
'93: Proceedings of the 13th annual international cryp-
tology conference on Advances in cryptology , pages 136-
146, New York, NY, USA, 1994. Springer-Verlag New
York , Inc.
[Krz03a]
Martin Krzywinski. Port knocking. Linux Journal ,June
2003.
[Krz03b]
Martin Krzywinski. Port knocking: Network authentica-
tion across closed ports. SysAdmin Magazine , 12:12-17,
2003.
[KSM06]
Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon.
Performance study of common image steganography
and steganalysis techniques. Journal of Electronic Imag-
ing , 15(4), 2006.
[KV89]
Michael Kearns and Leslie Valient. Cryptographic lim-
itations on learning boolean formulae and finite au-
tomata. In Proceedings of the Twenty-First Annual ACM
Symposium on Theory of Computing , pages 433-444,
Seattle, WA, May 1989.
[Lag84]
J. C. Lagarias. Performance analysis of shamir's attack
on the basic merkle-hellman knapsack cryptosystem.
In Proceedings of the 11th Colloquium on Automata,
Languages and Programming , pages 312-323, London,
UK, 1984. Springer-Verlag.
[LC04]
Shu Lin and Daniel J. Costello. Error Control Coding,
Second Edition . Prentice-Hall, Inc., Upper Saddle River,
NJ, USA, 2004.
Search WWH ::




Custom Search