共 50 条
- [41] Geometric-Invariant Image Watermarking by Key-Dependent Triangulation INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (02): : 169 - 181
- [42] Key-dependent pyramidal wavelet domains for secure watermark embedding SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 728 - 739
- [44] Authenticated and Misuse-Resistant Encryption of Key-Dependent Data ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 610 - 629
- [45] Key Dependent Cipher Scheme for Sensor Networks 2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 148 - 154
- [46] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
- [48] Construction of Key-dependent S-box for Secure Cloud Storage INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03): : 1509 - 1524
- [49] A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2009), 2009, : 595 - +
- [50] AES Security Improvement by Utilizing New Key-Dependent XOR Tables IEEE ACCESS, 2024, 12 : 53158 - 53177