Provably secure steganography - (Extended abstract)

被引:0
|
作者
Hopper, NJ [1 ]
Langford, J [1 ]
von Ahn, L [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:77 / 92
页数:16
相关论文
共 50 条
  • [31] Fair secure two-party computation - Extended abstract
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 87 - 105
  • [32] Secure multiparty computations using the 15 puzzle (Extended abstract)
    Mizuki, Takaaki
    Kugimoto, Yoshinori
    Sone, Hideaki
    [J]. COMBINATORIAL OPTIMIZATION AND APPLICATIONS, PROCEEDINGS, 2007, 4616 : 255 - +
  • [33] Secure Text Steganography
    Akhilandeswari, P.
    George, Jabin G.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 1 - 7
  • [34] Secure untrusted binaries - Provably!
    Winwood, S
    Chakravarty, MMT
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 171 - 186
  • [35] An architecture for provably secure computation
    Ajtai, M
    Dwork, C
    Stockmeyer, L
    [J]. LATIN 2006: THEORETICAL INFORMATICS, 2006, 3887 : 56 - 67
  • [36] Provably secure masking of AES
    Blömer, J
    Guajardo, J
    Krummel, V
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 69 - 83
  • [37] Provably secure metering scheme
    Ogata, W
    Kurosawa, K
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 388 - 398
  • [38] On the Efficiency of Provably Secure NTRU
    Cabarcas, Daniel
    Weiden, Patrick
    Buchmann, Johannes
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 22 - 39
  • [39] Provably Secure Homomorphic Signcryption
    Rezaeibagha, Fatemeh
    Mu, Yi
    Zhang, Shiwei
    Wang, Xiaofen
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 349 - 360
  • [40] Provably Secure Reflection Ciphers
    Beyne, Tim
    Chen, Yu Long
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT IV, 2022, 13510 : 234 - 263