scispace - formally typeset
Open Access

[기술해설]암호법(Cryptography)

조위덕
- Vol. 3, Iss: 2, pp 14-20
About
The article was published on 1987-07-01 and is currently open access. It has received 277 citations till now.

read more

Citations
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Optimally sparse representation in general (nonorthogonal) dictionaries via 1 minimization

TL;DR: This article obtains parallel results in a more general setting, where the dictionary D can arise from two or several bases, frames, or even less structured systems, and sketches three applications: separating linear features from planar ones in 3D data, noncooperative multiuser encoding, and identification of over-complete independent component models.
Journal ArticleDOI

Multimedia data-embedding and watermarking technologies

TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Book ChapterDOI

A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks

TL;DR: This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense.
Journal ArticleDOI

Robust audio watermarking using perceptual masking

TL;DR: This work presents a watermarking procedure to embed copyright protection into digital audio by directly modifying the audio samples and introduces the notion of a dual watermark: one which uses the original signal during detection and one which does not.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Optimally sparse representation in general (nonorthogonal) dictionaries via 1 minimization

TL;DR: This article obtains parallel results in a more general setting, where the dictionary D can arise from two or several bases, frames, or even less structured systems, and sketches three applications: separating linear features from planar ones in 3D data, noncooperative multiuser encoding, and identification of over-complete independent component models.
Book ChapterDOI

How to generate cryptographically strong sequences of pseudo random bits

TL;DR: A general algorithmic scheme for constructing polynomial-time deterministic algorithms that stretch a short secret random input into a long sequence of unpredictable pseudo-random bits is presented.
Journal ArticleDOI

Multimedia data-embedding and watermarking technologies

TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Book ChapterDOI

A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks

TL;DR: This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense.