Cryptography Reference
In-Depth Information
[Man03]
S. Manoharan. Using self-synchronizing codes to im-
prove steganography. In Internet and Multimedia Sys-
tems and Applications IMSA 2003 , Honolulu, USA, 8
2003.
[Mar84]
N. Margolus. Physics-likemodels of computation. Phys-
ica D , 10:81-95, 1984.
Discussion of reversible cellular automata illustrated by
an implementation of Fredkin's Billiard-Ball model of
computation.
[MBR99]
L. Marvel, C. Boncelet, and C. Retter. Spread spectrum
image steganography. IEEE Transactions on Image Pro-
cessing 8 , pages 1075-1083, August 1999.
[McH01]
John McHugh. Cover image.
In Fourth Information
Hiding Workshop , page 0, 2001.
[MCLK99] M. Miller, I. Cox, J. Linnartz, and T. Kalker. A review of
watermarking principles and practices, 1999.
[Mer93]
Ralph Merkle. Reversible electronic logic using
switches. Nanotechnology , 4:21-40, 1993.
[MF05]
Daniel B. Miller and Edward Fredkin. Two-state, revers-
ible, universal cellular automata in three dimensions. In
Bagherzadeh et al. [BVR05], pages 45-51.
[ML05]
Steven J. Murdoch and Stephen Lewis. Embedding
covert channels into tcp/ip. In Mauro Barni, Jordi
Herrera-Joancomartı, Stefan Katzenbeisser, and Fer-
nando Perez-Gonzalez, editors, Information Hiding ,
volume 3727 of Lecture Notes in Computer Science ,
pages 247-261. Springer, 2005.
[MM92]
IS Moskowitz and AR Miller. The channel capacity of a
certain noisy timing channel. IEEE Trans. on Informa-
tion Theory , IT-38(4):1339 - 43, 1992.
[Mon85]
P.L. Montgomery. Modular multiplication without trial
division. Mathematics of Computation , 44(170), 1985.
[MS08]
Wojciech Mazurczyk and Krzysztof Szczypiorski. Stega-
nography of voip streams, 2008.
[MTMM07] Robert P. McEvoy, Michael Tunstall, Colin C. Murphy,
and William P. Marnane. Differential power analysis
Search WWH ::




Custom Search