Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
21
views
9
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,223
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Provably Secure Steganography with Imperfect Sampling
other
Author(s):
Anna Lysyanskaya
,
Mira Meyerovich
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
9
Record
: found
Abstract
: not found
Article
: not found
On the limits of steganography
R.J. Anderson
,
F.A.P. Petitcolas
(1998)
0
comments
Cited
81
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
An Information-Theoretic Model for Steganography
Christian Cachin
(1998)
0
comments
Cited
58
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Model-Based Steganography
Phil Sallee
(2004)
0
comments
Cited
25
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 123-139
DOI:
10.1007/11745853_9
SO-VID:
20469542-44f3-4f8f-899a-1608ab531cb0
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Attacks on RSA with Small Secret CRT-Exponents
pp. 14
An Attack on a Modified Niederreiter Encryption Scheme
pp. 27
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm
pp. 44
Efficient Polynomial Operations in the Shared-Coefficients Setting
pp. 58
Generic On-Line/Off-Line Threshold Signatures
pp. 75
Linear Integer Secret Sharing and Distributed Exponentiation
pp. 91
Encoding-Free ElGamal Encryption Without Random Oracles
pp. 105
Parallel Key-Insulated Public Key Encryption
pp. 123
Provably Secure Steganography with Imperfect Sampling
pp. 140
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited
pp. 157
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption
pp. 174
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve
pp. 191
Efficient Scalar Multiplication by Isogeny Decompositions
pp. 229
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
pp. 241
Generalization of the Selective-ID Security Model for HIBE Protocols
pp. 257
Identity-Based Aggregate Signatures
pp. 274
On the Limitations of the Spread of an IBE-to-PKE Transformation
pp. 290
Inoculating Multivariate Schemes Against Differential Attacks
pp. 302
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol
pp. 315
High-Order Attacks Against the Exponent Splitting Protection
pp. 330
New Online/Offline Signature Schemes Without Random Oracles
pp. 347
Anonymous Signature Schemes
pp. 364
The Power of Identification Schemes
pp. 378
Security Analysis of KEA Authenticated Key Exchange Protocol
pp. 395
SAS-Based Authenticated Key Agreement
pp. 410
The Twist-AUgmented Technique for Key Exchange
pp. 427
Password-Based Group Key Exchange in a Constant Number of Rounds
pp. 443
Conditional Oblivious Cast
pp. 458
Efficiency Tradeoffs for Malicious Two-Party Computation
pp. 474
On Constructing Certificateless Cryptosystems from Identity Based Encryption
pp. 491
Building Better Signcryption Schemes with Tag-KEMs
pp. 508
Security-Mediated Certificateless Cryptography
pp. 525
k-Times Anonymous Authentication with a Constant Proving Cost
Similar content
5,223
Descriptions of some new leafhoppers (Homoptera: Cicadellidae) with notes on some synonymies and imperfectly known species from India.
Authors:
KR Rao
,
Rao
Influence of geometry imperfections on squeal noise linked to mode lock-in
Authors:
K. Bonnay
,
V. Magnier
,
J.F. Brunel
…
Fractional Excretion of Sodium (FENa): An Imperfect Tool for a Flawed Question.
Authors:
Harish Seethapathy
,
Andrew Z Fenves
See all similar
Cited by
4
Provably Secure Steganography
Authors:
Nicholas Hopper
,
Luis von Ahn
,
John Langford
Provably Secure Steganography and the Complexity of Sampling
Authors:
Christian Hundt
,
Maciej Liskiewicz
,
Ulrich Wölfel
On the Gold Standard for Security of Universal Steganography
Authors:
Sebastian Berndt
,
Maciej Liskiewicz
See all cited by