Cryptography Reference
In-Depth Information
[Kob87]
Neal Koblitz.
A Course in Number Theory and Cryptog-
raphy
. Springer-Verlag, New York, Berlin, Heidelberg,
London, Paris, Tokyo, 1987.
[Kom95]
John Kominek. Convergence of fractal encoded images.
In J. A. Storer and M. Cohn, editors,
Data Compression
Conference 1995
, pages 242-251, Snowbird, UT, USA,
March 1995.
[KQP01]
Farinaz Koushanfar, Gang Qu, and Miodrag Potkonjak.
Intellectual property metering. In
Fourth Information
Hiding Workshop
, 2001.
[Kra94]
Hugo Krawczyk. Secret sharing made short. In
CRYPTO
'93: Proceedings of the 13th annual international cryp-
tology conference on Advances in cryptology
, pages 136-
146, New York, NY, USA, 1994. Springer-Verlag New
York , Inc.
[Krz03a]
Martin Krzywinski. Port knocking.
Linux Journal
,June
2003.
[Krz03b]
Martin Krzywinski. Port knocking: Network authentica-
tion across closed ports.
SysAdmin Magazine
, 12:12-17,
2003.
[KSM06]
Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon.
Performance study of common image steganography
and steganalysis techniques.
Journal of Electronic Imag-
ing
, 15(4), 2006.
[KV89]
Michael Kearns and Leslie Valient. Cryptographic lim-
itations on learning boolean formulae and finite au-
tomata. In
Proceedings of the Twenty-First Annual ACM
Symposium on Theory of Computing
, pages 433-444,
Seattle, WA, May 1989.
[Lag84]
J. C. Lagarias. Performance analysis of shamir's attack
on the basic merkle-hellman knapsack cryptosystem.
In
Proceedings of the 11th Colloquium on Automata,
Languages and Programming
, pages 312-323, London,
UK, 1984. Springer-Verlag.
[LC04]
Shu Lin and Daniel J. Costello.
Error Control Coding,
Second Edition
. Prentice-Hall, Inc., Upper Saddle River,
NJ, USA, 2004.