Cryptography Reference
In-Depth Information
[Odl84]
A. M. Odlyzko. Cryptanalytic attacks on the multiplica-
tive knapsack scheme and on Shamir's fast signature
scheme.
IEEE Trans. Inform. Theory
, IT-30:594-601,
1984.
[ØS07a]
Lasse Øverlier and Paul Syverson. Improving efficiency
and simplicity of tor circuit establishment and hidden
services. In Borisov and Golle [BG07], pages 134-152.
[ØS07b]
Lasse Øverlier and Paul Syverson. Location hidden ser-
vices and valet nodes.
Telektronikk
, pages 52-60, Febru-
ary 2007.
[PBBC97]
A. Piva, M. Barni, F. Bartolini, and V. Cappellini. DCT-
based watermark recovering without resorting to the
uncorrupted original image. In
IEEE Signal Processing
Society 1997 International Conference on Image Process-
ing (ICIP'97)
, Santa Barbara, California, October 1997.
[PF05]
Alin C. Popescu and Hany Farid. Exposing digital forg-
eries in color filter array interpolated images.
IEEE
Transactions on Signal Processing
, 53(10):3948-3959,
2005.
[PK03]
Fabien A. P. Petitcolas and Hyoung Joong Kim, edi-
tors.
Digital Watermarking, First International Work-
shop, IWDW 2002, Seoul, Korea, November 21-22, 2002,
Revised Papers
, volume 2613 of
Lecture Notes in Com-
puter Science
. Springer, 2003.
[PN93]
N Proctor and P Neumann. Architectural implications
of covert channels. In
Proceedings of the 15th National
Computer Security Conference
, 1993.
[Poe44]
Edgar Allan Poe. The purloined letter.
The Gift: A Christ-
mas and New Year's Present for 1844
, 1844.
[Pop05]
A.C. Popescu.
Statistical Tools for Digital Image Foren-
sics
. PhD thesis, Department of Computer Science,
Dartmouth College, Hanover, NH, 2005.
[PP90]
B Pfitzmann and A Pfitzmann. How to break the
direct rsa-implementation of mixes. In
Advances
in Cryptology- Eurocrypt '89
, number 434. Springer-
Verlag, 1990.
[Pro]
Federal Information Processing. Fips pub 198: The
keyed-hash message authentication code (hmac).