Subspace-Based Encryption
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[3] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[4] Hualou Liang,et al. Blind Source Separation-Based Encryption of Images and Speeches , 2005, ISNN.
[5] Christopher Swenson. Modern cryptanalysis - techniques for advanced code breaking , 2008 .
[6] A. Rukhin,et al. Statistical Testing of Random Number Generators , 1999 .
[7] Atef Mermoul. An iterative speech encryption scheme based on subspace technique , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Matthew J. B. Robshaw,et al. Algebraic aspects of the advanced encryption standard , 2006 .
[10] Guanrong Chen,et al. Cryptanalyzing an Encryption Scheme Based on Blind Source Separation , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[11] Adel Belouchrani Jean-Fran,et al. Maximum likelihood source separation for discrete sources , 2007 .
[12] Christian Jutten,et al. On underdetermined source separation , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[13] Abdeldjalil Aïssa-El-Bey,et al. Underdetermined Blind Separation of Nondisjoint Sources in the Time-Frequency Domain , 2007, IEEE Transactions on Signal Processing.
[14] Lin Qiuhua,et al. Image cryptosystems based on blind source separation , 2003, International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003.
[15] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[16] Adel Belouchrani,et al. A subspace-based method for speech encryption , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).
[17] Qiu-Hua Lin,et al. Secure image communication using blind source separation , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[18] Andrzej Cichocki,et al. Hidden image separation from incomplete image mixtures by independent component analysis , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[19] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[20] Hualou Liang,et al. A blind source separation based method for speech encryption , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[21] Hualou Liang,et al. A Fast Decryption Algorithm for BSS-Based Image Encryption , 2006, ISNN.
[22] Adel Belouchrani,et al. Subspace-based technique for speech encryption , 2012, Digit. Signal Process..
[23] Guanrong Chen,et al. Cryptanalysis of an Encryption Scheme Based on Blind Source Separation , 2006, ArXiv.
[24] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[25] Fu-Liang Yin,et al. Blind source separation applied to image cryptosystems with dual encryption , 2002 .
[26] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[27] Ueli Maurer,et al. A universal statistical test for random bit generators , 1990, Journal of Cryptology.
[28] Peter C. Gutmann. Cryptographic Security Architecture: Design and Verification , 2003 .