-
1
-
-
84947237328
-
On the security of joint signatures and encryption
-
Advances in Cryptology: EUROCRYPT 2002 (L. Knudsen, ed.), Springer
-
J. H. An, Y. Dodis, and T. Rabin, "On the security of joint signatures and encryption," in Advances in Cryptology: EUROCRYPT 2002 (L. Knudsen, ed.), vol. 2332 of Lecture Notes in Computer Science, Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
3
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Advances in Cryptology: CRYPTO '98 (H. Krawczyk, ed.), Springer
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, "Relations among notions of security for public-key encryption schemes," in Advances in Cryptology: CRYPTO '98 (H. Krawczyk, ed.), vol. 1462 of Lecture Notes in Computer Science, Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
3042519430
-
An information-theoretic model for steganography
-
July 2004 Parts of this paper appeared in Proc. 2nd Workshop on Information Hiding, Springer
-
C. Cachin, "An information-theoretic model for steganography," Information and Computation, vol. 192, pp. 41-56, July 2004. Parts of this paper appeared in Proc. 2nd Workshop on Information Hiding, Springer, 1998.
-
(1998)
Information and Computation
, vol.192
, pp. 41-56
-
-
Cachin, C.1
-
5
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Advances in Cryptology: CRYPTO 2003 (D. Boneh, ed.), Springer
-
R. Canetti, H. Krawczyk, and J. Nielsen, "Relaxing chosen-ciphertext security," in Advances in Cryptology: CRYPTO 2003 (D. Boneh, ed.), vol. 2729 of Lecture Notes in Computer Science, Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.3
-
7
-
-
84870707379
-
A practical public-key cryptosystem provably secure against adaptive chosen-ciphertext attack
-
Advances in Cryptology: CRYPTO '98 (H. Krawczyk, ed.), Springer
-
R. Cramer and V. Shoup, "A practical public-key cryptosystem provably secure against adaptive chosen-ciphertext attack," in Advances in Cryptology: CRYPTO '98 (H. Krawczyk, ed.), vol. 1462 of Lecture Notes in Computer Science, Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
84957887122
-
On public-key steganography in the presence of an active warden
-
Information Hiding, 2nd International Workshop (D. Aucsmith, ed.), Springer
-
S. Craver, "On public-key steganography in the presence of an active warden," in Information Hiding, 2nd International Workshop (D. Aucsmith, ed.), vol. 1525 of Lecture Notes in Computer Science, pp. 355-368, Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 355-368
-
-
Craver, S.1
-
9
-
-
26444596883
-
Upper and lower bounds on black-box steganography
-
(J. Kilian, ed.), Lecture Notes in Computer Science, Springer
-
N. Dedić, G. Itkis, L. Reyzin, and S. Russell, "Upper and lower bounds on black-box steganography," in Proc. 2nd Theory of Cryptography Conference (TCC) (J. Kilian, ed.), Lecture Notes in Computer Science, Springer, 2005.
-
(2005)
Proc. 2nd Theory of Cryptography Conference (TCC)
-
-
Dedić, N.1
Itkis, G.2
Reyzin, L.3
Russell, S.4
-
10
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork, and M. Naor, "Non-malleable cryptography," SIAM Journal on Computing, vol. 30, no. 2, pp. 391-437, 2000.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
12
-
-
84937438364
-
Provably secure steganography
-
Advances in Cryptology: CRYPTO 2002 (M. Yung, ed.), Springer
-
N. J. Hopper, J. Langford, and L. von Ahn, "Provably secure steganography," in Advances in Cryptology: CRYPTO 2002 (M. Yung, ed.), vol. 2442 of Lecture Notes in Computer Science, Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
-
-
Hopper, N.J.1
Langford, J.2
Von Ahn, L.3
-
13
-
-
33645589530
-
-
Personal communication, Jan.
-
Y. Lindell. Personal communication, Jan. 2004.
-
(2004)
-
-
Lindell, Y.1
-
15
-
-
84947902426
-
An information-theoretic approach to steganography and watermarking
-
Information Hiding, 3rd International Workshop, IH'99 (A. Pfitzmann, ed.), Springer
-
T. Mittelholzer, "An information-theoretic approach to steganography and watermarking," in Information Hiding, 3rd International Workshop, IH'99 (A. Pfitzmann, ed.), vol. 1768 of Lecture Notes in Computer Science, pp. 1-16, Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1768
, pp. 1-16
-
-
Mittelholzer, T.1
-
16
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Advances in Cryptology: CRYPTO '91 (J. Feigenbaum, ed.), Springer
-
C. Rackoff and D. R. Simon, "Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack," in Advances in Cryptology: CRYPTO '91 (J. Feigenbaum, ed.), vol. 576 of Lecture Notes in Computer Science, pp. 433-444, Springer, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
19
-
-
17144422244
-
A proposal for an ISO standard for public key encryption
-
V. Shoup, "A proposal for an ISO standard for public key encryption." Cryptology ePrint Archive, Report 2001/112, 2001. http://eprint.iacr.org/.
-
(2001)
Cryptology EPrint Archive, Report
, vol.2001
, Issue.112
-
-
Shoup, V.1
-
20
-
-
1642489925
-
OAEP reconsidered
-
V. Shoup, "OAEP reconsidered," Journal of Cryptology, vol. 15, no. 4, pp. 223-249, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.4
, pp. 223-249
-
-
Shoup, V.1
-
21
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
(D. Chaum, ed.), Plenum Press
-
G. J. Simmons, "The prisoners' problem and the subliminal channel," in Advances in Cryptology: Proceedings of Crypto 83 (D. Chaum, ed.), pp. 51-67, Plenum Press, 1984.
-
(1984)
Advances in Cryptology: Proceedings of Crypto
, vol.83
, pp. 51-67
-
-
Simmons, G.J.1
-
22
-
-
33750401431
-
Public-key steganography
-
Advances in Cryptology: Eurocrypt 2004 (C. Cachin and J. Camenisch, eds.), Springer
-
L. von Ahn and N. J. Hopper, "Public-key steganography," in Advances in Cryptology: Eurocrypt 2004 (C. Cachin and J. Camenisch, eds.), vol. 3027 of Lecture Notes in Computer Science, pp. 322-339, Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 322-339
-
-
Von Ahn, L.1
Hopper, N.J.2
-
23
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," Journal of Computer and System Sciences, vol. 22, pp. 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
24
-
-
84957886335
-
Modeling the security of steganographic systems
-
Information Hiding, 2nd International Workshop (D. Aucsmith, ed.), Springer
-
J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the security of steganographic systems," in Information Hiding, 2nd International Workshop (D. Aucsmith, ed.), vol. 1525 of Lecture Notes in Computer Science, pp. 344-354, Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 344-354
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
|