#### Filter Results:

- Full text PDF available (67)

#### Publication Year

1986

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Ingemar J. Cox, Joe Kilian, Frank Thomson Leighton, Talal Shamoon
- IEEE Trans. Image Processing
- 1997

This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a… (More)

- Mihir Bellare, Joe Kilian, Phillip Rogaway
- J. Comput. Syst. Sci.
- 2000

The Cipher Block Chaining Message Authentication Code (CBC MAC) speciies that a message x = x 1 x m be authenticated among parties who share a secret key a by tagging x with a preex of f (m) a (x) def = f a (f a (f a (f a (x 1)x 2) x m?1)x m) ; where f is some underlying block cipher (e.g., the Data Encryption Standard) and a is its key. This method is a… (More)

- Joe Kilian
- STOC
- 1988

Suppose your netmail is being erratically censored by Captain Yossarian. Whenever you send a message, he censors each bit of the message with probability 1/2, replacing each censored bit by some reserved character. Well versed in such concepts as redundancy, this is no real problem to you. The question is, can it actually be turned around and used to your… (More)

- Kazue Sako, Joe Kilian
- EUROCRYPT
- 1995

- Bernard Chazelle, Joe Kilian, Ronitt Rubinfeld, Ayellet Tal
- SODA
- 2004

We introduce the <i>Bloomier filter</i>, a data structure for compactly encoding a function with static support in order to support approximate evaluation queries. Our construction generalizes the classical Bloom filter, an ingenious hashing scheme heavily used in networks and databases, whose main attribute---space efficiency---is achieved at the expense… (More)

- Uriel Feige, Joe Kilian
- J. Comput. Syst. Sci.
- 1996

We present a new technique, inspired by zero-knowledge proof systems, for proving lower bounds on approximating the chromatic number of a graph. To illustrate this technique we present simple reductions from max-3-coloring and max-3-sat, showing that it is hard to approximate the chromatic number within (N), for some > 0. We then apply our technique in… (More)

- Ransom Richardson, Joe Kilian
- EUROCRYPT
- 1999

We examine the concurrent composition of zero-knowledge proofs. By concurrent composition, we indicate a single prover that is involved in multiple, simultaneous zero-knowledge proofs with one or multiple verifiers. Under this type of composition it is believed that standard zero-knowledge protocols are no longer zero-knowledge. We show that, modulo certain… (More)

We describe a digital watermarking method for use in audio , image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to perceptual degradation… (More)

- Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank
- CRYPTO
- 2003

We consider the problem of extending oblivious transfers: Given a small number of oblivious transfers " for free, " can one implement a large number of oblivious transfers? Beaver has shown how to extend oblivious transfers given a one-way function. However, this protocol is inefficient in practice, in part due to its non-black-box use of the underlying… (More)

- Shafi Goldwasser, Joe Kilian
- STOC
- 1986

This paper presents a new probabilistie primality test. Upon termination the test outputs "composite" or "prime", along with a short proof of correctness, which can be verified in determinis-tic polynomial time. The test is different from the tests of Miller [M], Solovay-Strassen [SSI, and Rabin [R] in that its assertions of primality are certain, rather… (More)