Cryptography Reference
In-Depth Information
[Odl84]
A. M. Odlyzko. Cryptanalytic attacks on the multiplica-
tive knapsack scheme and on Shamir's fast signature
scheme.
IEEE Trans. Inform. Theory , IT-30:594-601,
1984.
[ØS07a]
Lasse Øverlier and Paul Syverson. Improving efficiency
and simplicity of tor circuit establishment and hidden
services. In Borisov and Golle [BG07], pages 134-152.
[ØS07b]
Lasse Øverlier and Paul Syverson. Location hidden ser-
vices and valet nodes. Telektronikk , pages 52-60, Febru-
ary 2007.
[PBBC97]
A. Piva, M. Barni, F. Bartolini, and V. Cappellini. DCT-
based watermark recovering without resorting to the
uncorrupted original image. In IEEE Signal Processing
Society 1997 International Conference on Image Process-
ing (ICIP'97) , Santa Barbara, California, October 1997.
[PF05]
Alin C. Popescu and Hany Farid. Exposing digital forg-
eries in color filter array interpolated images. IEEE
Transactions on Signal Processing , 53(10):3948-3959,
2005.
[PK03]
Fabien A. P. Petitcolas and Hyoung Joong Kim, edi-
tors. Digital Watermarking, First International Work-
shop, IWDW 2002, Seoul, Korea, November 21-22, 2002,
Revised Papers , volume 2613 of Lecture Notes in Com-
puter Science . Springer, 2003.
[PN93]
N Proctor and P Neumann. Architectural implications
of covert channels. In Proceedings of the 15th National
Computer Security Conference , 1993.
[Poe44]
Edgar Allan Poe. The purloined letter. The Gift: A Christ-
mas and New Year's Present for 1844 , 1844.
[Pop05]
A.C. Popescu. Statistical Tools for Digital Image Foren-
sics . PhD thesis, Department of Computer Science,
Dartmouth College, Hanover, NH, 2005.
[PP90]
B Pfitzmann and A Pfitzmann. How to break the
direct rsa-implementation of mixes. In Advances
in Cryptology- Eurocrypt '89 , number 434. Springer-
Verlag, 1990.
[Pro]
Federal Information Processing. Fips pub 198: The
keyed-hash message authentication code (hmac).
Search WWH ::




Custom Search