-
1
-
-
0002781783
-
Securing information with optical technologies
-
B. Javidi, "Securing information with optical technologies," Physics Today 50, 27-32 (1997).
-
(1997)
Physics Today
, vol.50
, pp. 27-32
-
-
Javidi, B.1
-
2
-
-
0029289969
-
Optical image encryption based on input plane and Fourier plane random encoding
-
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
3
-
-
0034246348
-
Optical encryption using a joint transform correlator architecture
-
T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng. 39, 2031-2035 (2000).
-
(2000)
Opt. Eng.
, vol.39
, pp. 2031-2035
-
-
Nomura, T.1
Javidi, B.2
-
4
-
-
22144431522
-
Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
-
A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005).
-
(2005)
Opt. Lett.
, vol.30
, pp. 1644-1646
-
-
Carnicer, A.1
Montes-Usategui, M.2
Arcos, S.3
Juvells, I.4
-
5
-
-
33744788334
-
Known-plaintext attack on optical encryption based on double random phase keys
-
X. Peng, H. Wei, and P. Zhang, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006).
-
(2006)
Opt. Lett.
, vol.31
, pp. 1044-1046
-
-
Peng, X.1
Wei, H.2
Zhang, P.3
-
6
-
-
70449435070
-
Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys
-
W. Qin and X. Peng, "Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys" J. Opt. A: Pure Appl. Opt. 11, 075402 (2009).
-
(2009)
J. Opt. A: Pure Appl. Opt.
, vol.11
, pp. 075402
-
-
Qin, W.1
Peng, X.2
-
7
-
-
0141629454
-
Public-key-based optical image cryptosystem with data embedding techniques
-
G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, "Public-key- based optical image cryptosystem with data embedding techniques," Opt. Eng. 42, 2331-2339 (2003).
-
(2003)
Opt. Eng.
, vol.42
, pp. 2331-2339
-
-
Lin, G.H.1
Chang, H.T.2
Lai, W.N.3
Chuang, C.H.4
-
8
-
-
33846148634
-
Asymmetric cryptography based on wavefront sensing
-
X. Peng, H. Wei, and P. Zhang, "Asymmetric cryptography based on wavefront sensing," Opt. Lett. 31, 3579-3581 (2006).
-
(2006)
Opt. Lett.
, vol.31
, pp. 3579-3581
-
-
Peng, X.1
Wei, H.2
Zhang, P.3
-
9
-
-
75749131585
-
Asymmetric cryptosystem based on phase-truncated Fourier transforms
-
W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010).
-
(2010)
Opt. Lett.
, vol.35
, pp. 118-120
-
-
Qin, W.1
Peng, X.2
|