Lecture Notes in Computer Science

Results: 278



#Item
151Computer graphics / Electronic engineering / Television / Graphics file formats / Steganography / Digital watermarking / Pixel / Watermark / Noise reduction / Image processing / Digital photography / Watermarking

Developments in Steganography Published in the Proceedings of the Third International Information Hiding Workshop, Dresden, Germany, September 29-October 1, 1999. Springer-Verlag Lecture Notes in Computer Science, 1768)

Add to Reading List

Source URL: sensor.cs.washington.edu

Language: English - Date: 2012-09-14 16:56:19
152Diffie–Hellman key exchange / Key-agreement protocol / Advantage / Diffie–Hellman problem / Cryptographic nonce / Adversary model / SPEKE / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Random oracle

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
153Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
154Computability theory / Oracle machine

A preliminary version of this paper appeared in Theory of Cryptography Conference, TCC ’05, Lecture Notes in Computer Science Vol. ???, Joe Kilian ed, Springer Verlag, 2005. This is the full version. Secure Computation

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 13:27:27
155Lattice / Digital signature / Cryptography / Public-key cryptography / Elliptic Curve DSA

Proceedings of PKC ’05 (January 23–26, 2005, Les Diablerets, Switzerland) S. Vaudenay (Ed.), vol. ???? of Lecture Notes in Computer Science, pages ??–?? c IACR (http://www.iacr.org) and Springer-Verlag (http://www

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-19 06:18:26
156ID-based encryption / Advantage / Certificate-based encryption / Ciphertext / Standard model / ID-based cryptography / RSA / Cipher / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

Lecture Notes in Computer Science:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-04 06:00:47
157MD5 / Pseudorandom function family / Pseudorandomness / Cryptographic hash function / Initialization vector / Integrated Encryption Scheme / Cryptography / Block cipher / Advantage

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
158CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
159Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:00:14
160Glabbeek / Lecture Notes in Computer Science / Operational semantics / Geography of Belgium / Computer science / Belgium / Electronic Proceedings in Theoretical Computer Science / Logic in computer science / Programming language semantics

References [1] L. Aceto, W.J. Fokkink, R.J. van Glabbeek & A. Ing´olfsd´ottir (1996): Axiomatizing Prefix Iteration with Silent Steps. Information and Computation 127(1), pp. 26–40, doi:incoAvail

Add to Reading List

Source URL: rvg.web.cse.unsw.edu.au

Language: English - Date: 2015-05-13 04:41:10
UPDATE