-
2
-
-
35048861558
-
Public-Key Steganography with Active Attacks
-
November 6
-
M. Backes and G. Cachin. Public-Key Steganography with Active Attacks. Cryptology ePrint Archive, Report 2003/231, November 6, 2003. Available electronically: http ://eprint.iacr.org/2003/231.
-
(2003)
Cryptology EPrint Archive, Report 2003/231
-
-
Backes, M.1
Cachin, G.2
-
5
-
-
84957887122
-
On Public-key Steganography in the Presence of an Active Warden
-
Springer LNCS 1525
-
S. Craver. On Public-key Steganography in the Presence of an Active Warden. Proceedings of Second International Information Hiding Workshop, Springer LNCS 1525, pages 355-368, 1998.
-
(1998)
Proceedings of Second International Information Hiding Workshop
, pp. 355-368
-
-
Craver, S.1
-
6
-
-
0345253860
-
A Pseudorandom generator from any one-way function
-
J. Hastad, R. Impagliazzo, L. Levin, and M. Luby. A Pseudorandom generator from any one-way function. SI AM Journal of Computing, 28 (4), pages 1364-1396, 1999.
-
(1999)
SI AM Journal of Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
10
-
-
84974554584
-
Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Springer LNCS 576
-
C. Rackoff and D. Simon. Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Advances in Cryptology: CRYPTO 91, Springer LNCS 576, pages 433-444, 1992.
-
(1992)
Advances in Cryptology: CRYPTO 91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
11
-
-
0001217738
-
The Prisoner's Problem and the Subliminal Channel
-
G. J. Simmons. The Prisoner's Problem and the Subliminal Channel. Advances in Cryptology: CRYPTO 83, pages 51-67, 1983.
-
(1983)
Advances in Cryptology: CRYPTO 83
, pp. 51-67
-
-
Simmons, G.J.1
-
12
-
-
33745846827
-
Efficient Proven Secure Public Key Steganography
-
September 3
-
T. Van Le. Efficient Proven Secure Public Key Steganography. Cryptology ePrint Archive, Report 2003/156, September 3, 2003. Available electronically: http://eprint.iacr.org/2003/156.
-
(2003)
Cryptology EPrint Archive, Report 2003/156
-
-
Van Le, T.1
-
13
-
-
84957360674
-
Kleptography: Using Cryptography against Cryptography
-
Springer LNCS 1233
-
A. Young and M. Yung. Kleptography: Using Cryptography against Cryptography. Advances in Cryptology: Eurocrypt 97, Springer LNCS 1233, pages 62-74, 1997.
-
(1997)
Advances in Cryptology: Eurocrypt 97
, pp. 62-74
-
-
Young, A.1
Yung, M.2
-
14
-
-
84957886335
-
Modeling the security of steganographic systems
-
Springer LNCS 1525
-
J. Zollner, H. Federrath, H. Klimant, A. Pftizmann, R. Piotraschke, A. Westfield, G. Wicke, G. Wolf. Modeling the security of steganographic systems. Proceedings of the Second International Information Hiding Workshop, Springer LNCS 1525, pages 344-354, 1998.
-
(1998)
Proceedings of the Second International Information Hiding Workshop
, pp. 344-354
-
-
Zollner, J.1
Federrath, H.2
Klimant, H.3
Pftizmann, A.4
Piotraschke, R.5
Westfield, A.6
Wicke, G.7
Wolf, G.8
|