메뉴 건너뛰기




Volumn 50, Issue 8, 2011, Pages

Universal and special keys based on phase-truncated Fourier transform

Author keywords

Asymmetric encryption; Optical encoding; Phase truncated Fourier transform

Indexed keywords

ASYMMETRIC ENCRYPTION; CIPHERTEXTS; DECRYPTION KEYS; ENCRYPTION KEY; FOURIER; OPTICAL ENCODING; PLAINTEXT;

EID: 81355163453     PISSN: 00913286     EISSN: 15602303     Source Type: Journal    
DOI: 10.1117/1.3607421     Document Type: Article
Times cited : (65)

References (9)
  • 1
    • 0002781783 scopus 로고    scopus 로고
    • Securing information with optical technologies
    • B. Javidi, "Securing information with optical technologies," Physics Today 50, 27-32 (1997).
    • (1997) Physics Today , vol.50 , pp. 27-32
    • Javidi, B.1
  • 2
    • 0029289969 scopus 로고
    • Optical image encryption based on input plane and Fourier plane random encoding
    • P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
    • (1995) Opt. Lett. , vol.20 , pp. 767-769
    • Refregier, P.1    Javidi, B.2
  • 3
    • 0034246348 scopus 로고    scopus 로고
    • Optical encryption using a joint transform correlator architecture
    • T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng. 39, 2031-2035 (2000).
    • (2000) Opt. Eng. , vol.39 , pp. 2031-2035
    • Nomura, T.1    Javidi, B.2
  • 4
    • 22144431522 scopus 로고    scopus 로고
    • Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
    • A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005).
    • (2005) Opt. Lett. , vol.30 , pp. 1644-1646
    • Carnicer, A.1    Montes-Usategui, M.2    Arcos, S.3    Juvells, I.4
  • 5
    • 33744788334 scopus 로고    scopus 로고
    • Known-plaintext attack on optical encryption based on double random phase keys
    • X. Peng, H. Wei, and P. Zhang, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006).
    • (2006) Opt. Lett. , vol.31 , pp. 1044-1046
    • Peng, X.1    Wei, H.2    Zhang, P.3
  • 6
    • 70449435070 scopus 로고    scopus 로고
    • Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys
    • W. Qin and X. Peng, "Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys" J. Opt. A: Pure Appl. Opt. 11, 075402 (2009).
    • (2009) J. Opt. A: Pure Appl. Opt. , vol.11 , pp. 075402
    • Qin, W.1    Peng, X.2
  • 7
    • 0141629454 scopus 로고    scopus 로고
    • Public-key-based optical image cryptosystem with data embedding techniques
    • G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, "Public-key- based optical image cryptosystem with data embedding techniques," Opt. Eng. 42, 2331-2339 (2003).
    • (2003) Opt. Eng. , vol.42 , pp. 2331-2339
    • Lin, G.H.1    Chang, H.T.2    Lai, W.N.3    Chuang, C.H.4
  • 8
    • 33846148634 scopus 로고    scopus 로고
    • Asymmetric cryptography based on wavefront sensing
    • X. Peng, H. Wei, and P. Zhang, "Asymmetric cryptography based on wavefront sensing," Opt. Lett. 31, 3579-3581 (2006).
    • (2006) Opt. Lett. , vol.31 , pp. 3579-3581
    • Peng, X.1    Wei, H.2    Zhang, P.3
  • 9
    • 75749131585 scopus 로고    scopus 로고
    • Asymmetric cryptosystem based on phase-truncated Fourier transforms
    • W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010).
    • (2010) Opt. Lett. , vol.35 , pp. 118-120
    • Qin, W.1    Peng, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.