A Comparative Survey on Cryptology-Based Methodologies
暂无分享,去创建一个
Nikolaos G. Bourbakis | Ming Yang | Allan Rwabutaza | N. Bourbakis | A. Rwabutaza | Ming-How Yang | Allan Rwabutaza
[1] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[2] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[3] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.
[4] Joos Vandewalle,et al. Differential cryptanalysis of hash functions based on block ciphers , 1993, CCS '93.
[5] Howard M. Heys,et al. The design of substitution-permutation networks resistant to differential and linear cryptanalysis , 1994, CCS '94.
[6] Stafford E. Tavares,et al. Information leakage of boolean functions and its relationship to other cryptographic criteria , 1994, CCS '94.
[7] Alan T. Sherman,et al. How to break Gifford's cipher (extended abstract) , 1994, CCS '94.
[8] Heba Kamal Aslan,et al. Implementation of a hybrid encryption scheme for Ethernet , 1995, Proceedings IEEE Symposium on Computers and Communications.
[9] Hung-Min Sun,et al. Cryptanalysis of private-key encryption schemes based on burst-error-correcting codes , 1996, CCS '96.
[10] Serge Vaudenay,et al. An experiment on DES statistical cryptanalysis , 1996, CCS '96.
[11] Bharat K. Bhargava,et al. A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.
[12] Marcos A. Kiwi,et al. Strength of two data encryption standard implementations under timing attacks , 1998, TSEC.
[13] Wenjun Zeng,et al. Efficient frequency domain video scrambling for content access control , 1999, MULTIMEDIA '99.
[14] Dan Boneh,et al. Finding smooth integers in short intervals using CRT decoding , 2000, STOC '00.
[15] Pradosh Kumar Mohapatra. Public key cryptography , 2000, CROS.
[16] Ramesh Karri,et al. Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit symmetric block ciphers , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[17] Thomas S. Huang,et al. An image watermarking technique using pyramid transform , 2001, MULTIMEDIA '01.
[18] Jacques Stern,et al. The Two Faces of Lattices in Cryptology , 2001, CaLC.
[19] Jiun-In Guo,et al. Design of a New Cryptography System , 2002, IEEE Pacific Rim Conference on Multimedia.
[20] Eli Biham,et al. How to decrypt or even substitute DES-encrypted messages in 228 steps , 2002, Inf. Process. Lett..
[21] Luca Benini,et al. Energy-aware design techniques for differential power analysis protection , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).
[22] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[23] Jean-Pierre Seifert,et al. A new CRT-RSA algorithm secure against bellcore attacks , 2003, CCS '03.
[24] M. Shaar,et al. A hybrid hiding encryption algorithm (HHEA) for data communication security , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[25] Chi-Ching Chang,et al. Hybrid encrypted holographic data storage , 2003, 2003 Conference on Lasers and Electro-Optics Europe (CLEO/Europe 2003) (IEEE Cat. No.03TH8666).
[26] David A. Wagner,et al. Cryptanalysis of a provably secure CRT-RSA algorithm , 2004, CCS '04.
[27] Ramarathnam Venkatesan,et al. Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics , 2004, MM&Sec '04.
[28] Nikolaos G. Bourbakis,et al. Image and video encryption using SCAN patterns , 2004, Pattern Recognit..
[29] Darko Kirovski,et al. Multimedia Security Handbook , 2004 .
[30] Ahmet M. Eskicioglu,et al. Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.
[31] Ahmad-Reza Sadeghi,et al. Overcoming the obstacles of zero-knowledge watermark detection , 2004, MM&Sec '04.
[32] Zuhua Shao. Cryptanalysis of publicly verifiable authenticated encryption , 2004, InfoSecu '04.
[33] N. Bourbakis,et al. Data-image-video encryption , 2004, IEEE Potentials.
[34] Andreas Uhl,et al. Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption , 2005, MM&Sec '05.
[35] Hartmut König,et al. A novel encryption algorithm for high resolution video , 2005, NOSSDAV '05.
[36] M. Ayoub Khan,et al. On the security of joint signature and hybrid encryption , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[37] Ingrid Verbauwhede,et al. A VLSI design flow for secure side-channel attack resistant ICs , 2005, Design, Automation and Test in Europe.
[38] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[39] Magdy Saeb,et al. An improved FPGA implementation of the modified hybrid hiding encryption algorithm (MHHEA) for data communication security , 2005, Design, Automation and Test in Europe.
[40] Kouichi Sakurai,et al. Side Channel Cryptanalysis on XTR Public Key Cryptosystem , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[41] Tieniu Tan,et al. Extended optimization method of LSB steganalysis , 2005, IEEE International Conference on Image Processing 2005.
[42] Deepa Kundur,et al. Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.
[43] Mohammad Umar Siddiqi,et al. A Framework for Describing Block Cipher Cryptanalysis , 2006, IEEE Transactions on Computers.
[44] Alex Biryukov,et al. An introduction to Block Cipher Cryptanalysis , 2006, Proceedings of the IEEE.
[45] Benoit M. Macq,et al. Watermarking relying on cover signal content to hide synchronization marks , 2006, IEEE Transactions on Information Forensics and Security.
[46] N. Nalini,et al. Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique , 2006, 9th International Conference on Information Technology (ICIT'06).
[47] Fernando Pérez-González,et al. An accurate analysis of scalar quantization-based data hiding , 2006, IEEE Transactions on Information Forensics and Security.
[48] Yixian Yang,et al. Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[49] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[50] Takashi Matsumoto,et al. A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification , 2006, IEEE Transactions on Information Forensics and Security.
[51] Giovanni Di Crescenzo,et al. Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.
[52] Lei Guo,et al. Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[53] Zhang Hong-bin,et al. Image Texture Energy-Entropy-Based Blind Steganalysis , 2007 .
[54] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[55] Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.
[56] Nikolaos G. Bourbakis,et al. A robust information hiding methodology in wavelet domain , 2007, SIP.
[57] Yixian Yang,et al. A Novel Hybrid Encryption Scheme against Adaptive Chosen Ciphertext Attack , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[58] Jing Dong,et al. Blind image steganalysis based on run-length histogram analysis , 2008, 2008 15th IEEE International Conference on Image Processing.
[59] Jon Erickson,et al. Hacking: The Art of Exploitation , 2008 .
[60] C. Pandu Rangan,et al. Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[61] S. Manoharan,et al. An Empirical Analysis of RS Steganalysis , 2008, 2008 The Third International Conference on Internet Monitoring and Protection.
[62] N. Rowe. Ethics of Deception in Virtual Communities , 2008 .
[63] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[64] K. P. Subbalakshmi,et al. Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.
[65] Bin Jiang,et al. Pattern Analysis Applied on Steganalysis for Binary Text Images , 2008, 2008 International Symposium on Electronic Commerce and Security.
[66] Guanrong Chen,et al. Cryptanalyzing an Encryption Scheme Based on Blind Source Separation , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[67] Xu Mankun,et al. Steganalysis of LSB matching based on histogram features in grayscale image , 2008, 2008 11th IEEE International Conference on Communication Technology.
[68] Xu Mankun,et al. Steganalysis of LSB Matching Based on Wavelet Denoising Estimation in Grayscale Image , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[69] Hamid R. Nemati,et al. Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .
[70] Tim Güneysu,et al. Cryptanalysis with COPACOBANA , 2008, IEEE Transactions on Computers.
[71] Fenlin Liu,et al. Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits , 2008, IEEE Transactions on Information Forensics and Security.
[72] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[73] Munir Majdalawieh,et al. The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise , 2010, Int. J. Inf. Secur. Priv..
[74] Hamid R. Nemati,et al. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering , 2010 .
[75] Nikolaos G. Bourbakis,et al. SCAN secure processor and its biometric capabilities , 2011, J. Electronic Imaging.
[76] Kenneth Jacobs. A Survey of Modern Mathematical Cryptology , 2011 .
[77] John E. Canavan,et al. Fundamentals of Network Security , 2012 .