共 31 条
- [1] ANDERSON J, 1996, 1 INT WORKSH INF HID, P39
- [2] On the limits of steganography [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 474 - 481
- [4] Bourbakis NG, 1997, IEEE SYS MAN CYBERN, P1117, DOI 10.1109/ICSMC.1997.638099
- [5] Cachin C, 1998, LECT NOTES COMPUT SC, V1525, P306
- [6] COLOMB S, 1966, IEEE T INFORM THEORY, V12, P399
- [7] DERRICK G, 2001, COMPUTER LAW SECURIT, V17, P101
- [8] Stronger security proofs for RSA and Rabin bits [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (02) : 221 - 244
- [9] Fridrich J, 1997, IEEE SYS MAN CYBERN, P1105, DOI 10.1109/ICSMC.1997.638097
- [10] Robust and efficient sharing of RSA functions [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (02) : 273 - 300