-
1
-
-
0032312612
-
A public key watermark for image verification and authentication
-
October
-
P. Wong, "A Public Key Watermark for Image Verification and Authentication," IEEE International Conference on Image Processing (ICIP'98), vol. I, pp. 455-459, October 1998.
-
(1998)
IEEE International Conference on Image Processing (ICIP'98)
, vol.1
, pp. 455-459
-
-
Wong, P.1
-
3
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, 2000.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
4
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
October
-
P. Wong and N. Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification," IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, October 2001
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.1
Memon, N.2
-
5
-
-
0003602325
-
The MD5 message digest algorithm
-
IETF
-
R. Rivest. "The MD5 message digest algorithm," Technical Report RFC1321, IETF, 1992.
-
(1992)
Technical Report
, vol.RFC1321
-
-
Rivest, R.1
-
6
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
7
-
-
67649461062
-
-
Scientific American, M. Gardner's column
-
R. Rivest, A. Shamir, and L. Adleman, "RSA challenge," Scientific American, M. Gardner's column, 1977.
-
(1977)
RSA Challenge
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
8
-
-
84955575947
-
The magic words are squeamish ossifrage
-
Advances in Cryptology, Springer, Berlin
-
D. Atkins, M. Graff, A. Lenstra, and P. Leyland, "The magic words are squeamish ossifrage," Advances in Cryptology, LNCS 917, pp. 263-277, Springer, Berlin, 1995.
-
(1995)
LNCS
, vol.917
, pp. 263-277
-
-
Atkins, D.1
Graff, M.2
Lenstra, A.3
Leyland, P.4
-
9
-
-
22844453978
-
Factorization of RSA-140 using the number field sieve
-
Advances in Cryptology, Springer, Berlin
-
S. Cavallar, B. Dodson, A. Lenstra, P. Leyland,W. Lioen, P. Montgomery, B. Murphy, H. Riele and P. Zimmermann, "Factorization of RSA-140 using the Number Field Sieve," Advances in Cryptology, LNCS 1716, pp. 195-207, Springer, Berlin, 1999.
-
(1999)
LNCS
, vol.1716
, pp. 195-207
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.3
Leyland, P.4
Lioen, W.5
Montgomery, P.6
Murphy, B.7
Riele, H.8
Zimmermann, P.9
-
10
-
-
77956089601
-
Factorization of a 512-bit RSA Modulus
-
Advances in Cryptology, Springer, Berlin
-
S. Cavallar, W. Lioen, H. Riele, B. Dodson, A.Lenstra, P. Montgomery and B. Murphy, "Factorization of a 512-bit RSA Modulus," Advances in Cryptology, LNCS 1807, pp. 1-8, Springer, Berlin, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 1-8
-
-
Cavallar, S.1
Lioen, W.2
Riele, H.3
Dodson, B.4
Lenstra, A.5
Montgomery, P.6
Murphy, B.7
-
11
-
-
38249007777
-
Birthday paradox, coupon collectors, caching algorithms and self-organizing search
-
P. Flajolet, D. Gardy and L. Thimonier, "Birthday paradox, coupon collectors, caching algorithms and self-organizing search," Discrete Applied Mathematics, vol. 39, no. 3, pp. 207-229, 1992.
-
(1992)
Discrete Applied Mathematics
, vol.39
, Issue.3
, pp. 207-229
-
-
Flajolet, P.1
Gardy, D.2
Thimonier, L.3
|