暂无分享,去创建一个
Aggelos Kiayias | Alexander Russell | Narasimha Shashidhar | A. Kiayias | A. Russell | N. Shashidhar
[1] Nicholas Hopper,et al. Public-Key Steganography , 2003, EUROCRYPT.
[2] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[3] Thomas Mittelholzer,et al. An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.
[4] Noam Nisan,et al. Extracting Randomness: A Survey and New Constructions , 1999, J. Comput. Syst. Sci..
[5] Noam Nisan,et al. Extracting randomness: how and why. A survey , 1996, Proceedings of Computational Complexity (Formerly Structure in Complexity Theory).
[6] Avi Wigderson,et al. Extracting randomness via repeated condensing , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[7] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[8] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[9] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[10] Ran Raz,et al. Extracting all the randomness and reducing the error in Trevisan's extractors , 1999, STOC '99.
[11] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[12] Victor Shoup,et al. A computational introduction to number theory and algebra , 2005 .
[13] Aggelos Kiayias,et al. Efficient Steganography with Provable Security Guarantees , 2005, Information Hiding.
[14] Ronen Shaltiel,et al. Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.