共 50 条
- [21] Security Under Key-Dependent Inputs CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 466 - 475
- [22] The Key-Dependent Attack on Block Ciphers ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 19 - 36
- [24] ON THE SECURE WATERMARK EMBEDDING SCHEME BASED ON SELECTIVE ENCRYPTION INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 205 - 217
- [25] A SECURE GRAPHICAL AUTHENTICATION SYSTEM USING WATERMARK EMBEDDING 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1024 - 1026
- [26] Embedding QR code watermark in divided wavelet domain TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : A287 - A290
- [28] Key-dependent Compressed Domain Audio Hashing ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 29 - 32
- [29] The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis COMPUTER JOURNAL, 2023, 66 (02): : 269 - 279