{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:28:41Z","timestamp":1767706121372},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540423003"},{"type":"electronic","value":"9783540477198"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47719-5_17","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T01:15:16Z","timestamp":1180746916000},"page":"190-205","source":"Crossref","is-referenced-by-count":8,"title":["Secure and Private Distribution of Online Video and Some Related Cryptographic Issues"],"prefix":"10.1007","author":[{"given":"Feng","family":"Bao","sequence":"first","affiliation":[]},{"given":"Robert","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Peirong","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hongjun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,4]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security protocols: International Workshop\u201997","author":"R. Anderson","year":"1997","unstructured":"R. Anderson and M. Kuhn, \u201cLow cost attacks on tamper resistant devices\u201d, in Security protocols: International Workshop\u201997, LNCS 1361, Springer-Verlag, pp. 125\u2013136, 1997."},{"key":"17_CR2","unstructured":"F. Bao, R. Deng, P. Feng, \u201cAn efficient and practical scheme for privacy protection in e-commerce of digital goods\u201d, Pre-Proceedings of The 3rd International Conference on Information Security and Cryptology (ICISC00), pp. 167\u2013176, 2000."},{"key":"17_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Eurocrypt\u201994","author":"M. Bellare","year":"1995","unstructured":"M. Bellare and P. Rogaway, \u201cOptimal asymmetric encryption\u201d, Eurocrypt\u201994, LNCS, Springer-Verlag, 1995."},{"issue":"1","key":"17_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysi of DES-like cryptosystems\u201d, Journal of Cryptology, Vol. 4, No. 1, pp. 3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"17_CR5","unstructured":"E. Biham, R. Anderson and L. Knudsen, \u201cSerpent: a proposal for the advanced encryption standard\u201d, http:\/\/www.cl.cam.ac.uk\/~rja14\/serpent.html ."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"D. Boneh and G. Durfee, \u201cCryptanalysis of RSA with private key d less than N0.292\u201d, Eurocrypt\u201999, pp. 1\u201311, Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48910-X_1"},{"key":"17_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Proc of Eurocrypt\u201997","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R. DeMillo, and R. Lipton, \u201cOn the importantance of checking cryptographic protocols for faults\u201d, in Proc of Eurocrypt\u201997, LNCS 1233, Springer-Verlag, pp. 37\u201351, 1997."},{"key":"17_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Crypto\u201995","author":"D. Boneh","year":"1995","unstructured":"D. Boneh and J. Shaw, \u201cCollusion-secure fingerprinting for digital data\u201d, Crypto\u201995, LNCS, pp. 452\u2013465, Springer-Verlag, 1995."},{"key":"17_CR9","first-page":"292","volume":"LNCS","author":"J. Coron","year":"1999","unstructured":"J. Coron, \u201cRisistance against differential power analysis for elliptic curve cryptosystems\u201d, Proc. Of CHES\u201999, LNCS 1717, Springer-Verlag, pp. 292\u2013302, 1999.","journal-title":"Proc. Of CHES\u201999"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"B. Chor and N. Gilboa, \u201cComputational private information retrieval\u201d, Proc. of 29th STOC, pp. 304\u2013313, 1997.","DOI":"10.1145\/258533.258609"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"B. Chor, O. Goldreich, E. Kushilevita, and M. Sudan, \u201cPrivate information retrieval\u201d, Proc. of 36th FOCS, pp. 41\u201350, 1995.","DOI":"10.1109\/SFCS.1995.492461"},{"key":"17_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Financial Cryptography 01","author":"J. Coron","year":"2001","unstructured":"J. Coron, P. Kocher, and D. Naccache, \u201cStatistics and secret leaksge\u201d, to appear in the Proceedings of Financial Cryptography 01, LNCS, Springer-Verlag."},{"key":"17_CR13","unstructured":"I.J. Cox, J.P.M.G. Linnartz, \u201cSome general methods for tampering with watermarks\u201d, in IEEE international Conference on Image Processing\u201d, 1997."},{"key":"17_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-48910-X_28","volume-title":"Proceedings of Eurocrypt\u201999","author":"C. Cachin","year":"1999","unstructured":"C. Cachin, S. Micali, and M. Stadler, \u201cComputationally Private Information Retrieval with Polylogrithmic Communication\u201d, in Proceedings of Eurocrypt\u201999, LNCS, Springer-Verlag, pp. 402\u2013414, 1999."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"S. Craver, N. Memon, B. Yeo, M. Yeung, \u201cCan invisible watermarks resolve rightful ownership\u201d, IBM Research Report, RC 20509, July 25, 1996.","DOI":"10.1117\/12.263419"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"J. Coron, D. Naccache and J. Stern, \u201cOn the security of RSA padding\u201d, Crypto\u201999, pp. 1\u201318, Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_1"},{"key":"17_CR17","unstructured":"http:\/\/www.tandem.com\/brfs_wps\/esscpttb\/esscpttb.htm"},{"key":"17_CR18","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of FSE\u201998","author":"D. Coppersmith","year":"1998","unstructured":"D. Coppersmith, D. Wagner, B. Schneier and J. Kelsey, \u201cCryptanalysis of TWOPRIMES\u201d, Proceedings of FSE\u201998, LNCS, Springer-Verlag, 1998."},{"key":"17_CR19","unstructured":"W. Dai, \u201cSpeed benchmarks of various ciphers and hash functions\u201d, http:\/\/www.eskimo.com\/~weidai\/benchmarks.html ."},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Y. Gertner, Y. Ishai, E. Kushilevita and T. Malkin, \u201cProtecting data privacy in private information retrieval schemes\u201d, Proc. of 30th STOC, 1998.","DOI":"10.1145\/276698.276723"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"C. Griwodz, O. Merkel, J. Dittmann, R. Steinmetz, \u201cProtecting VoD the Easier Way\u201d, ACM Multimedia\u2019 98, pp. 21\u201328, Bristol, UK, 1998.","DOI":"10.1145\/290747.290751"},{"key":"17_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-48059-5_26","volume-title":"Proc. Of CHES\u201999","author":"H. Handschun","year":"1999","unstructured":"H. Handschun, P. Paillier, and J. Stern, \u201cProbing attacks on tamper-resisyant devices\u201d, Proc. Of CHES\u201999, LNCS 1717, Springer-Verlag, pp. 303\u2013315, 1999."},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"R. Jain, \u201cThe convergence of PCs and TV\u201d, IEEE Multimedia, October\/December 1999.","DOI":"10.1109\/MMUL.1999.809225"},{"key":"17_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BFb0024460","volume-title":"Cryptography and Coding","author":"M. Joye","year":"1997","unstructured":"M. Joye, J.-J. Quisquater, F. Bao, and R.H. Deng, \u201cRSA-type signatures in the presence of transient faults\u201d, In M. Darnell, editor, Cryptography and Coding, Vol. 1355 of Lecture Notes in Computer Science, pp. 155\u2013160, Springer-Verlag, 1997."},{"key":"17_CR25","unstructured":"L. R. Knudsen, \u201cThe block cipher lounge\u2014AES\u201d, http:\/\/www.ii.uib.no\/~larsr\/aes.html ."},{"key":"17_CR26","unstructured":"E. Kushilevita and R. Ostrovsky, \u201cSingle-database computationally private information retrieval\u201d, Proc. Of 38th FOCS, 1997."},{"key":"17_CR27","unstructured":"P. Kocher, http:\/\/www.cryptography.com\/resources\/"},{"key":"17_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Proceedings of Eurocrypt\u201993","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher\u201d, Proceedings of Eurocrypt\u201993, LNCS 765, Springer-Verlag, pp. 386\u2013397, 1994."},{"key":"17_CR29","unstructured":"Video Dialtone Technology, McGraw-Hill, 1995."},{"issue":"6","key":"17_CR30","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/5.387094","volume":"83","author":"B. M. Macq","year":"1995","unstructured":"B. M. Macq and J-J Quisquater, \u201cCryptology for digital TV broadcasting\u201d, Proceedings of the IEEE, Vol. 83, No, 6, pp. 944\u2013957, 1995.","journal-title":"Proceedings of the IEEE"},{"key":"17_CR31","unstructured":"T. Maples and G. Spanos, \u201cPerformance study of a selective Encryption scheme for security of networked, real-time video\u201d, Proc. of the 4th International Conference on Computer and Communications and Networks, Las Vegas, Nevada, Sept, 1995."},{"key":"17_CR32","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0030404","volume-title":"Proceedings of Eurocrypt\u201998","author":"T. Okamoto","year":"1998","unstructured":"T. Okamoto and S. Uchiyama, \u201cA new public-key cryptosystem as secure as factoring\u201d, Proceedings of Eurocrypt\u201998, LNCS, Springer-Verlag, 1998."},{"key":"17_CR33","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Eurocrypt\u201996","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann and M. Shunter, \u201cAsymmetric fingerprinting\u201d, Eurocrypt\u201996, LNCS 1070, pp. 84\u201395, Springer-Verlag, 1996."},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and A. Sadeghi, \u201cCoin-based anonymous fingerprinting\u201d, Eurocrypt\u201999, pp. 150-164, Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48910-X_11"},{"key":"17_CR35","unstructured":"L. Qiao, K. Nahrstedt and I. Tarn, \u201cIs MPEG encryption using random lists instead of Zig Zag Order\u201d, IEEE International Symposium on Consumer Electronics, Dec, 1997."},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.","DOI":"10.1007\/978-3-642-82865-2"},{"key":"17_CR37","doi-asserted-by":"crossref","unstructured":"L. Tang, \u201cMethods for Encrypting and decrypting MPEG video data efficiently\u201d, Proc. of the 4th ACM Multimedia Conference, Boston, MA, November, 1996.","DOI":"10.1145\/244130.244209"},{"issue":"3","key":"17_CR38","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/18.54902","volume":"36","author":"M. Wiener","year":"1990","unstructured":"M. Wiener, \u201cCryptanalysis of short RSA secret exponents\u201d, IEEE Transactions on Information Theory, Vol. 36, No. 3, pp. 553\u2013558, 1990.","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR39","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/10718964_9","volume-title":"Proc. of ACISP2000","author":"H. Wu","year":"2000","unstructured":"H. Wu, F. Bao, D. Ye, R. Deng, \u201cCryptoanalysis of the m-permutation protection schemes\u201d, Proc. of ACISP2000, LNCS 1841, Springer-Verlag, pp. 97\u2013111, 2000."},{"key":"17_CR40","unstructured":"J. Zhao and E. Koch, \u201cEmbedding robust label into images for copyright protection\u201d, Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Austria, Aug. 21\u201325, 1995."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47719-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:07:14Z","timestamp":1556453234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47719-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423003","9783540477198"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/3-540-47719-5_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}