-
1
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, "Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing," EURASIP J. Inf. Security, vol. 2007, pp. 20-20, 2007.
-
(2007)
EURASIP J. Inf. Security
, vol.2007
, pp. 20-20
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.L.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
2
-
-
60449097613
-
-
R. Rivest, L. Adleman, and M. Dertouzos, On data banks and privacy homomorphisms, in Foundations of Secure Computation, R. DeMillo, Ed. et al. London, U.K.: Academic, 1978, pp. 169-179.
-
R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation, R. DeMillo, Ed. et al. London, U.K.: Academic, 1978, pp. 169-179.
-
-
-
-
3
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
J. Comput. Syst. Sci
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
4
-
-
0020312165
-
Protocols for secure computations
-
Chicago, IL, Nov
-
A. C. Yao, "Protocols for secure computations," in Proc. IEEE Symp. Foundations Computer Science, Chicago, IL, Nov. 1982, pp. 160-164.
-
(1982)
Proc. IEEE Symp. Foundations Computer Science
, pp. 160-164
-
-
Yao, A.C.1
-
5
-
-
0023545076
-
How to play ANY mental game
-
New York
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play ANY mental game," in Proc. 19th Annu. ACM Conf. Theory of Computing, New York, 1987, pp. 218-229.
-
(1987)
Proc. 19th Annu. ACM Conf. Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
6
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Notes Comput. Sci. New York: Springer
-
R. Cramer, I. Damgård, and J. B. Nielsen, "Multiparty computation from threshold homomorphic encryption," in, ser. Lect. Notes Comput. Sci. New York: Springer, 2001, vol. 2045, pp. 280-300.
-
(2001)
ser. Lect
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
7
-
-
33746092442
-
-
B. Schoenmakers and P. Tuyls, Efficient binary conversion for Paillier encrypted values, in Proc. Eurocrypt: Advances in Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2006, 4004, pp. 522-537.
-
B. Schoenmakers and P. Tuyls, "Efficient binary conversion for Paillier encrypted values," in Proc. Eurocrypt: Advances in Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer, 2006, vol. 4004, pp. 522-537.
-
-
-
-
8
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Apr
-
N. Memon and P. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
-
(2001)
IEEE Trans. Image Process
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.2
-
9
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
Dec
-
C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 13, no. 12, pp. 1618-1626, Dec. 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
10
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Dec
-
M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Processing, vol. 14, no. 12, pp. 2129-2139, Dec. 2005.
-
(2005)
IEEE Trans. Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
11
-
-
84942550998
-
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Proc. Eurocrypt: Advances in Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer-Verlag, 1999, 1592, pp. 223-238.
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Eurocrypt: Advances in Cryptology, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer-Verlag, 1999, vol. 1592, pp. 223-238.
-
-
-
-
12
-
-
84867553981
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
I. Damgârd and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in Public Key Cryptography, 2001, pp. 119-136.
-
(2001)
Public Key Cryptography
, pp. 119-136
-
-
Damgârd, I.1
Jurik, M.2
-
13
-
-
0024478791
-
m DFT's
-
Jan
-
m DFT's," IEEE Trans. Acoust., Speech, Signal Process., vol. 37, no. 1, pp. 57-64, Jan. 1989.
-
(1989)
IEEE Trans. Acoust., Speech, Signal Process
, vol.37
, Issue.1
, pp. 57-64
-
-
Vetterli, M.1
Duhamel, P.2
-
14
-
-
0023364252
-
Real-valued fast Fourier transform algorithms
-
Jun
-
H. Sorensen, D. Jones, M. Heideman, and C. Burrus, "Real-valued fast Fourier transform algorithms," IEEE Trans. Acoust., Speech, Signal Process., vol. 35, no. 6, pp. 849-863, Jun. 1987.
-
(1987)
IEEE Trans. Acoust., Speech, Signal Process
, vol.35
, Issue.6
, pp. 849-863
-
-
Sorensen, H.1
Jones, D.2
Heideman, M.3
Burrus, C.4
-
17
-
-
0014522322
-
A fixed-point fast Fourier transform error analysis
-
Jun
-
P. D. Welch, "A fixed-point fast Fourier transform error analysis," IEEE Trans. Audio Electroacoust., vol. AU-17, no. 2, pp. 151-157, Jun. 1969.
-
(1969)
IEEE Trans. Audio Electroacoust
, vol.AU-17
, Issue.2
, pp. 151-157
-
-
Welch, P.D.1
-
18
-
-
33846236688
-
Effects of finite register length in digital filtering and the fast Fourier transform
-
Aug
-
A. V. Oppenheim and C. J. Weinstein, "Effects of finite register length in digital filtering and the fast Fourier transform," Proc. IEEE, vol. 60, no. 8, pp. 957-976, Aug. 1972.
-
(1972)
Proc. IEEE
, vol.60
, Issue.8
, pp. 957-976
-
-
Oppenheim, A.V.1
Weinstein, C.J.2
-
19
-
-
0016518798
-
Quantization errors in the fast Fourier transform
-
Jun
-
D. V. James, "Quantization errors in the fast Fourier transform," IEEE Trans. Acoust., Speech, Signal Process., vol. ASSP-23, no. 3, pp. 277-283, Jun. 1975.
-
(1975)
IEEE Trans. Acoust., Speech, Signal Process
, vol.ASSP-23
, Issue.3
, pp. 277-283
-
-
James, D.V.1
-
20
-
-
0034215495
-
The Montgomery modular inverse-Revisited
-
Jul
-
E. Savas and Ç. K. Koç, "The Montgomery modular inverse-Revisited," IEEE Trans. Comput., vol. 49, no. 7, pp. 763-766, Jul. 2000.
-
(2000)
IEEE Trans. Comput
, vol.49
, Issue.7
, pp. 763-766
-
-
Savas, E.1
Koç, C.K.2
-
21
-
-
13244286640
-
A hardware algorithm for modular multiplication/division
-
Jan
-
M. E. Kaihara and N. Takagi, "A hardware algorithm for modular multiplication/division," IEEE Trans. Comput., vol. 54, no. 1, pp. 12-21, Jan. 2005.
-
(2005)
IEEE Trans. Comput
, vol.54
, Issue.1
, pp. 12-21
-
-
Kaihara, M.E.1
Takagi, N.2
-
22
-
-
0030172012
-
Analyzing and comparing Montgomery multiplication algorithms
-
Jun
-
Ç. K. Koç, T. Acar, and B. S. Kalinski, "Analyzing and comparing Montgomery multiplication algorithms," IEEE Micro, vol. 16, no. 3, pp. 26-33, Jun. 1996.
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 26-33
-
-
Koç, C.K.1
Acar, T.2
Kalinski, B.S.3
-
23
-
-
0029358884
-
The Montgomery inverse and its applications
-
Aug
-
B. S. Kalinski, "The Montgomery inverse and its applications," IEEE Trans. Comput., vol. 44, no. 8, pp. 1064-1065, Aug. 1995.
-
(1995)
IEEE Trans. Comput
, vol.44
, Issue.8
, pp. 1064-1065
-
-
Kalinski, B.S.1
-
24
-
-
60449085988
-
-
D. E. Knuth, The Art of Computer Programming, 3rd: Seminumerical algorithms ed. Reading, MA: Addison-Wesley Longman, 1997, 2.
-
D. E. Knuth, The Art of Computer Programming, 3rd: Seminumerical algorithms ed. Reading, MA: Addison-Wesley Longman, 1997, vol. 2.
-
-
-
|