Documents Related by Co-Citation

1754 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
6 M.: Lecture notes on cryptography. Summer course on cryptography at MIT (2001 – S Goldwasser, Bellare - 2003
45 Digital Watermarking of Raw and Compressed Video – Frank Hartung, Bernd Girod - 1996
24 Applying signatures on digital images – I Pitas, T Kaskalis - 1995
10 Cryptography,” in Handbook of Theoretical Computer – R Rivest - 1990
12 Encoding a hidden digital signature onto an audio signal using psychoacoustic masking – J F Tilki, A Beex - 1996
428 Techniques for data hiding – W BENDER, D GRUHL, N MORIMOTO, A LU - 1996
157 A Two-Dimensional Digital Watermark – Tirkel Van Schyndel - 1995
131 A Watermark For Digital Images – Raymond B. Wolfgang, Edward J. Delp - 1996
802 Secure spread spectrum watermarking for multimedia – Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, Talal Shamoon - 1997
126 Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications – S Craver, N Memon, B Yeo, M Yeung - 1998
76 Building secure file systems out of byzantine storage – David Mazières, Dennis Shasha - 2002
670 Completeness theorems for noncryptographic fault-tolerant distributed computation – M Ben-Or, S Goldwasser, A Wigderson
13 Cryptography and np-completeness – S Evan, Y Yacobi - 1980
14 Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits – Dima Grigoriev, Ilia Ponomarenko - 2003
5 Public-key cryptography and invariant theory, arXiv:math.cs.- CR/0207080 – Dima Grigoriev
7 Polly two – a new algebraic polynomial-based public-key scheme – L Ly
20 The tale of one-way functions – Leonid A. Levin - 2003