-
1
-
-
44049106287
-
Analysis and design of cryptographic hash functions, mac algorithms and block ciphers,
-
Ph.D. dissertation, Katholieke Universiteit Leuven, Faculteit Toegepaste Wetenschappen Departement Elektrotechniek
-
B. V. Rompay, "Analysis and design of cryptographic hash functions, mac algorithms and block ciphers," Ph.D. dissertation, Katholieke Universiteit Leuven, Faculteit Toegepaste Wetenschappen Departement Elektrotechniek, 2004.
-
(2004)
-
-
Rompay, B.V.1
-
2
-
-
84981199109
-
A design principle for hash functions
-
I. Damgard, "A design principle for hash functions," in Crypto '89, vol. 435, 1989, pp. 416-427.
-
(1989)
Crypto '89
, vol.435
, pp. 416-427
-
-
Damgard, I.1
-
3
-
-
44049100953
-
-
S. Lucks, Design principles for iterated hash functions, 2004, lucks, Design Principles for Iterated Hash Functions, IACR preprint archive, http://eprint.iacr.org/2004/253.pdf, 2004.
-
S. Lucks, "Design principles for iterated hash functions," 2004, lucks, Design Principles for Iterated Hash Functions, IACR preprint archive, http://eprint.iacr.org/2004/253.pdf, 2004.
-
-
-
-
4
-
-
84890522850
-
Communication theory of secrecy systems
-
October
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, October 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
5
-
-
1942436689
-
Image quality assessment: From error measurement to structural similarity
-
Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: From error measurement to structural similarity," IEEE Transactions On Image Processing, vol. 13, 2004.
-
(2004)
IEEE Transactions On Image Processing
, vol.13
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
6
-
-
0032667318
-
Robust bit extraction from images
-
Florence, Italy, June
-
J. Fridrich, "Robust bit extraction from images," in ICMCS '99, Florence, Italy, June 1999.
-
(1999)
ICMCS '99
-
-
Fridrich, J.1
-
8
-
-
0034444578
-
Robust image hashing
-
R. Venkatesan, S. Koon, M. Jakubowski, and P. Moulin, "Robust image hashing," in Proc. IEEE Int. Conf. Image Processing, 2000.
-
(2000)
Proc. IEEE Int. Conf. Image Processing
-
-
Venkatesan, R.1
Koon, S.2
Jakubowski, M.3
Moulin, P.4
-
9
-
-
84962762130
-
Robust hash functions for digital watermarking
-
Washington, DC, USA: IEEE Computer Society
-
J. Fridrich and M. Goljan, "Robust hash functions for digital watermarking," in ITCC '00: Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00). Washington, DC, USA: IEEE Computer Society, 2000, p. 178.
-
(2000)
ITCC '00: Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
, pp. 178
-
-
Fridrich, J.1
Goljan, M.2
-
10
-
-
0242576290
-
On the security of visual hash function
-
Santa Clara, CA, USA, January
-
R. Radhakrishnan, Z. Xiong, and N. D. Memon, "On the security of visual hash function," in Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, vol. 5020, January 2003.
-
(2003)
Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V
, vol.5020
-
-
Radhakrishnan, R.1
Xiong, Z.2
Memon, N.D.3
|