-
1
-
-
78651071103
-
Zero-knowledge watermark detection and proof of ownership
-
Workshop
-
Adelsbach, A., Sadeghi, A.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding Workshop (2000)
-
(2000)
Information Hiding
-
-
Adelsbach, A.1
Sadeghi, A.2
-
3
-
-
0035751083
-
Paillier's cryptosystem revisited
-
ACM Press, New York, NY, USA
-
Catalano, D., Gennaro, R., Howgrave-Graham, N., Nguyen, P.Q.: Paillier's cryptosystem revisited. In: CCS '01: Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 206-214. ACM Press, New York, NY, USA (2001)
-
(2001)
CCS '01: Proceedings of the 8th ACM conference on Computer and Communications Security
, pp. 206-214
-
-
Catalano, D.1
Gennaro, R.2
Howgrave-Graham, N.3
Nguyen, P.Q.4
-
4
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans, on Information Theory 47(4), 1423-1443 (2001)
-
(2001)
IEEE Trans, on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
9
-
-
38049136724
-
-
Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Heidelberg (1994)
-
Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Heidelberg (1994)
-
-
-
-
10
-
-
38049129396
-
-
Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Crypto (1996)
-
Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Crypto (1996)
-
-
-
-
12
-
-
38049129397
-
-
Jaffe, J., Kocher, P., Jun, B.: Differential power analysis: Leaking secrets. In: Crypto, Springer, Heidelberg (1999)
-
Jaffe, J., Kocher, P., Jun, B.: Differential power analysis: Leaking secrets. In: Crypto, Springer, Heidelberg (1999)
-
-
-
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt '99, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
Proceedings of Eurocrypt '99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
38049110438
-
Security of public watermarking schemes for binary sequences
-
Workshop
-
Chang, E.C., Li, Q.: Security of public watermarking schemes for binary sequences. In: Information Hiding Workshop (2002)
-
(2002)
Information Hiding
-
-
Chang, E.C.1
Li, Q.2
-
15
-
-
0002908662
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In: Proc. of Public Key Cryptography (2001)
-
(2001)
Proc. of Public Key Cryptography
-
-
Damgård, I.1
Jurik, M.2
|