Academic literature on the topic 'Optical cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Optical cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Optical cryptography"

1

Liu, Hong-Chao, and Wen Chen. "Optical ghost cryptography and steganography." Optics and Lasers in Engineering 130 (July 2020): 106094. http://dx.doi.org/10.1016/j.optlaseng.2020.106094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shi, Yishi, and Xiubo Yang. "Optical hiding with visual cryptography." Journal of Optics 19, no. 11 (2017): 115703. http://dx.doi.org/10.1088/2040-8986/aa895e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

DONATI Silvano, 唐士文, ANNOVAZZI-LODI Valerio ANNOVAZZI-LODI Valerio, and 王昭 WANG Zhao. "Recent advances in optical cryptography." Chinese Journal of Optics and Applied Optics 7, no. 1 (2014): 89–97. http://dx.doi.org/10.3788/co.20140701.0089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Franson, J. D., and H. Ilves. "Quantum cryptography using optical fibers." Applied Optics 33, no. 14 (1994): 2949. http://dx.doi.org/10.1364/ao.33.002949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Townsend, Paul D. "Quantum Cryptography on Optical Fiber Networks." Optical Fiber Technology 4, no. 4 (1998): 345–70. http://dx.doi.org/10.1006/ofte.1998.0270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ogura, Yusuke, Masahiko Aino, and Jun Tanida. "Microscale optical cryptography using a subdiffraction-limit optical key." Japanese Journal of Applied Physics 57, no. 4 (2018): 040309. http://dx.doi.org/10.7567/jjap.57.040309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pham, Hai, Rainer Steinwandt, and Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme." Entropy 21, no. 9 (2019): 872. http://dx.doi.org/10.3390/e21090872.

Full text
Abstract:
Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish security guarantees. Quantum cryptography has demonstrated how physical properties of a communication channel can be leveraged in the design of cryptographic protocols, too. Our starting point is the AlphaEta protocol, which was designed to exploit properties of coherent states of light to transmit data securely over an optical channel. AlphaEta aims to draw security from the uncertainty of any measurement of the transmitted coherent states due to intrinsic quantum noise. We present a technique to combine AlphaEta with classical preprocessing, taking into account error-correction for the optical channel. This enables us to establish strong provable security guarantees. In addition, the type of hybrid encryption we suggest, enables trade-offs between invoking a(n inexpensive) classical communication channel and a (more complex to implement) optical channel, without jeopardizing security. Our design can easily incorporate fast state-of-the-art authenticated encryption, but in this case the security analysis requires heuristic reasoning.
APA, Harvard, Vancouver, ISO, and other styles
8

Aswad, Firas Mohammed, Ihsan Salman, and Salama A. Mostafa. "An optimization of color halftone visual cryptography scheme based on Bat algorithm." Journal of Intelligent Systems 30, no. 1 (2021): 816–35. http://dx.doi.org/10.1515/jisys-2021-0042.

Full text
Abstract:
Abstract Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance the visual quality and avoid the problems of cross-interference and pixel expansion of the share images. It introduces a novel optimization of color halftone visual cryptography (OCHVC) scheme by using two proposed techniques: hash codebook and construction techniques. The new techniques distribute the information pixels of a secret image into a halftone cover image randomly based on a bat optimization algorithm. The results show that these techniques have enhanced security levels and make the proposed OCHVC scheme more robust against different attacks. The OCHVC scheme achieves mean squared error (MSE) of 95.0%, peak signal-to-noise ratio (PSNR) of 28.3%, normalized cross correlation (NCC) of 99.4%, and universal quality index (UQI) of 99.3% on average for the six shares. Subsequently, the experiment results based on image quality metrics show improvement in size, visual quality, and security for retrieved secret images and meaningful share images of the OCHVC scheme. Comparing the proposed OCHVC with some related works shows that the OCHVC scheme is more effective and secure.
APA, Harvard, Vancouver, ISO, and other styles
9

Liñares-Beiras, Jesús, Xesús Prieto-Blanco, Daniel Balado, and Gabriel M. Carral. "Autocompensating Measurement-Device-Independent quantum cryptography in few-mode optical fibers." EPJ Web of Conferences 238 (2020): 09002. http://dx.doi.org/10.1051/epjconf/202023809002.

Full text
Abstract:
We present an autocompensating quantum cryptography technique for Measurement-Device-Independent quantum cryptography devices with different kind of optical fiber modes. We center our study on collinear spatial modes in few-mode optical fibers by using both fiber and micro-optical components. We also indicate how the obtained results can be easily extended to polarization modes in monomode optical fibers and spatial codirectional modes in multicore optical fibers.
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Xiangyu, Aimin Yan, and Hongbo Zhang. "Ciphertext-only attack on optical scanning cryptography." Optics and Lasers in Engineering 126 (March 2020): 105901. http://dx.doi.org/10.1016/j.optlaseng.2019.105901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Optical cryptography"

1

Gastaud, Gallagher Nicolas Hugh René. "Multi-Gigahertz Encrypted Communication Using Electro-Optical Chaos Cryptography." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19701.

Full text
Abstract:
Chaotic dynamics are at the center of multiple studies to perfect encrypted communication systems. Indeed, the particular time evolution nature of chaotic signals constitutes the fundamentals of their application to secure telecommunications. The pseudo random signal constitutes the carrier wave for the communication. The information coded on the carrier wave can be extracted with knowledge of the system dynamic evolution law. This evolution law consists of a second-order delay differential equation in which intervene the various parameters of the physical system setup. The set of precise parameter values forms the key, in a cryptographic sense, of the encrypted transmission. This thesis work presents the implementation of an experimental encryption system using chaos. The optical intensity of the emitter fluctuates chaotically and serves as carrier wave. A message of small amplitude, hidden inside the fluctuations of the carrier wave, is extracted from the transmitted signal by a properly tuned receiver. The influence of the message modulation format on the communication quality both in the back to back case and after propagation is investigated numerically.
APA, Harvard, Vancouver, ISO, and other styles
2

Funk, Andrew Christopher. "Cryptography using two-mode quantum mechanically squeezed optical pulses /." view abstract or download file of text, 2004. http://wwwlib.umi.com/cr/uoregon/fullcit?p3120623.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2004.<br>Typescript. Includes vita and abstract. Includes bibliographical references (leaves 204-209). Also available for download via the World Wide Web; free to University of Oregon users.
APA, Harvard, Vancouver, ISO, and other styles
3

Ray, Megan. "Verifying Optical Entanglement." Thesis, University of Oregon, 2013. http://hdl.handle.net/1794/13430.

Full text
Abstract:
We look at the problem of verifying optical entanglement for two types of states relevant to quantum information processing. One type occurs in Hong-Ou-Mandel interference and is relevant to quantum computing. The other type is time frequency entanglement which is useful for quantum key distribution. For these types of states the conventional methods of entanglement verification do not work well, and we develop new criteria and methods to verify entanglement of such states. Explicitly, one method takes into account the possible multimode character of two photons, while the other method takes into account the missing data that occur due to the finite range of detectors. This dissertation includes previously published and unpublished co-authored material.
APA, Harvard, Vancouver, ISO, and other styles
4

Park, Euibyung. "Nonclassicality and entanglement of optical fields and their application to quantum cryptography." Thesis, Queen's University Belfast, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.437550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rontani, Damien. "Communications with chaotic optoelectronic systems - cryptography and multiplexing." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42810.

Full text
Abstract:
With the rapid development of optical communications and the increasing amount of data exchanged, it has become utterly important to provide effective ar- chitectures to protect sensitive data. The use of chaotic optoelectronic devices has already demonstrated great potential in terms of additional computational security at the physical layer of the optical network. However, the determination of the security level and the lack of a multi-user framework are two hurdles which have prevented their deployment on a large scale. In this thesis, we propose to address these two issues. First, we investigate the security of a widely used chaotic generator, the external cavity semiconductor laser (ECSL). This is a time-delay system known for providing complex and high-dimensional chaos, but with a low level of security regarding the identification of its most critical parameter, the time delay. We perform a detailed analysis of the influence of the ECSL parameters to devise how higher levels of security can be achieved and provide a physical interpretation of their origin. Second, we devise new architectures to multiplex optical chaotic signals and realize multi-user communications at high bit rates. We propose two different approaches exploiting known chaotic optoelectronic devices. The first one uses mutually cou- pled ECSL and extends typical chaos-based encryption strategies, such as chaos-shift keying (CSK) and chaos modulation (CMo). The second one uses an electro-optical oscillator (EOO) with multiple delayed feedback loops and aims first at transpos- ing coded-division multiple access (CDMA) and then at developing novel strategies of encryption and decryption, when the time-delays of each feedback loop are time- dependent.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.

Full text
Abstract:
La sécurité est un problème important dans la transmission et le stockage de l'image, tandis que le cryptage est un moyen d'assurer la sécurité qui est requise dans de nombreuses applications (télévision par câble, la communication d'images militaires, systèmes d'imagerie confidentielle, etc.). Toutefois, à l'instar du message texte, les données images présentent des caractéristiques spéciales telles que la haute capacité, la redondance et la haute corrélation entre les pixels, et nécessite souvent une transmission et des traitements temps réel pour certaines applications. Construire un système rapide et efficace de cryptographie d'images suscite un intérêt considérable. C'est dans ce contexte qu’ont été menés ces travaux thèse qui portent sur l’élaboration d’un corrélateur optique en termes de cryptage/décryptage des données pour son implémentation dans un montage optique innovant. L’objectif de ces travaux est de réaliser un système optique de chiffrement sur la base d'exploitation de transformation optique et de générateurs chaotiques. L'idée originale des travaux consiste à exploiter la non-linéarité des systèmes chaotiques comme clés de chiffrement pour les systèmes optiques de chiffrement d'images multispectrales. Dans ces travaux de thèse, nous avons proposés et évalués plusieurs chiffrements d'images à base d’un système hyperchaotique et de transformées optiques (gyrator, Fourier, Baker , Arnold et Gerchberg- Saxton) à partir d’un processus de cryptage reposant sur une décomposition composants RVB et un encodage dans un flux dimensionnel d’images couleurs. L'originalité des solutions de chiffrement adoptée reposent sur l'exploitation de signaux réellement aléatoires à travers la mise en œuvre de générateurs hyperchaotiques pour la génération de données aléatoires sous forme images comme base de matrices de clés de chiffrement. En effet, ces générateurs présentent des propriétés et des caractéristiques fondamentales en termes de cryptage car il présente une non-linéarité, une imprédictibilité et une extrême sensibilité aux conditions initiales les rendant très intéressantes pour le développement de clés de chiffrement par flot. L’algorithme mis en œuvre permet d'extraire en temps réel les caractéristiques de texture dans les différentes bandes spectrales d'images en vue d’évaluer et de détecter les teneurs potentielles en information et dont les transmissions doivent être sécurisée via une transmission optique<br>Optical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
APA, Harvard, Vancouver, ISO, and other styles
7

Rontani, Damien. "Nonlinear dynamics of photonic components. Chaos cryptography and multiplexing." Phd thesis, Supélec, 2011. http://tel.archives-ouvertes.fr/tel-00783267.

Full text
Abstract:
With the rapid development of optical communications and the increasing amount of data exchanged, it has become utterly important to provide effective architectures to protect sensitive data. The use of chaotic optoelectronic devices has already demonstrated great potential in terms of additional computational security at the physical layer of the optical network. However, the determination of the security level and the lack of a multi-user framework are two hurdles which have prevented their deployment on a large scale. In this thesis, we propose to address these two issues. First, we investigate the security of a widely used chaotic generator, the external cavity semiconductor laser (ECSL). This is a time-delay system known for providing complex and high-dimensional chaos, but with a low level of security regarding the identification of its most critical parameter, the time delay. We perform a detailed analysis of the influence of the ECSL parameters to devise how higher levels of security can be achieved and provide a physical interpretation of their origin. Second, we devise new architectures to multiplex optical chaotic signals and realize multi-user communications at high bit rates. We propose two different approaches exploiting known chaotic optoelectronic devices. The first one uses mutually coupled ECSL and extends typical chaos-based encryption strategies, such as chaos-shift keying (CSK) and chaos modulation (CMo). The second one uses an electro-optical oscillator (EOO) with multiple delayed feedback loops and aims first at transposing coded-division multiple access (CDMA) and then at developing novel strategies of encryption and decryption, when the time-delays of each feedback loop are time- dependent.
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Ketaki Animesh. "Multiplexing high speed quantum key distribution with conventional data on a single optical fibre." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Locquet, Alexandre Daniel. "Chaotic optical communications using delayed feedback systems." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10431.

Full text
Abstract:
Chaotic dynamics produced by optical delay systems have interesting applications in telecommunications. Optical chaos can be used to transmit secretly, in real-time, a message between an emitter and a receiver. The noise-like appearance of chaos is used to conceal the message, and the synchronization of the receiver with the chaotic emitter is used to decode the message. This work focuses on the study of two crucial topics in the field of chaotic optical communications. The first topic is the synchronization of chaotic external-cavity laser diodes, which are among the most promising chaotic emitters for secure communications. It is shown that, for edge-emitting lasers, two drastically different synchronization regimes are possible. The regimes differ in terms of the delay time in the synchronization and in terms of the robustness of the synchronization with respect to parameter mismatches between the emitter and the receiver. In vertical-cavity surface-emitting lasers, the two linearly-polarized components of the electric field also exhibit isochronous and anticipating synchronization when the coupling between the lasers is isotropic. When the coupling is polarized, the linearly-polarized component that is parallel to the injected polarization tends to synchronize isochronously with the injected optical field, while the other component tends to be suppressed, but it can also be antisynchronized. The second topic is the analysis of time series produced by optical chaotic emitters subjected to a delayed feedback. First, we verify with experimental data that chaos produced by optical delay systems is highly complex. This high complexity is demonstrated by estimating chaos dimension and entropy from experimental time series and from models of optical delay systems. Second, by analyzing chaotic time series, it is shown that the value of the delay of a single-delay system can always be identified, independently of the type of system used and of its complexity. Unfortunately, an eavesdropper can use this information on the delay value to break the cryptosystem. We propose a new cryptosystem with two delayed feedback loops that increases the difficulty of the delay identification problem.
APA, Harvard, Vancouver, ISO, and other styles
10

Vannier, Dos Santos Borges Carolina. "Bell inequalities with Orbital Angular Momentum of Light." Thesis, Paris 11, 2012. http://www.theses.fr/2012PA112225/document.

Full text
Abstract:
Dans une première partie introductive, nous rappelons la description théorique de la propagation de faisceaux optiques en terme des modes solutions de l'équation de propagation dans l'approximation paraxialle. Dans ce cadre, nous présentons les notions de moment cinétique transporté par les faisceaux lumineux, et de sa décomposition en moment cinétique intrinsèque (ou spin) et en moment angulaire.La seconde partie est consacrée au codage de l'information dans les degrés de libertés de polarisation et de modes transverses des faisceaux optiques. Les modes spin-orbites sont définis et un dispositif expérimental optique pour produire ces modes est présenté. Les modes spin-orbites sont alors exploités pour implémenter un protocole de distribution de clés BB84 ne nécessitant pas le partage à priori d'une base de référence.Dans une troisième partie, nous proposons un critère de type inégalité de Bell, qui constitue une condition suffisante pour caractériser la non-séparabilité en spin-orbite d'un faisceau optique classique. Nous montrons ensuite que la notion de modes spin-orbite séparable ou non-séparable constitue une analogie pertinente avec la notion d'intrication d'états quantiques et permet l'étude de certaines de ses propriétés fondamentales. Enfin, une implémentation expérimentale de cette simulation de tests de Bell avec des faisceaux optiques classiques est présentée, ainsi que sa description détaillée dans le cadre de l'optique quantique.Dans une dernière partie, nous nous intéressons à des inégalités de Bell, pour des états quantiques de systèmes quantiques à deux parties, qui sont caractérisées chacune par une variable continue de type angulaire (périodique). Nous montrons comment détecter la non-localité sur ce type de système, avec des inégalités qui sont similaires aux inégalités CHSH; inégalités qui avaient été développées originellement pour des systèmes de type spin 1/2. Nos inégalités, sont construites à partir de la mesure de la corrélation de fonctions angulaires. Nous montrons qu'elles sont en fait la superposition continue d'inégalités CHSH de type spin 1/2. Nous envisageons une possible implémentation expérimentale, où les corrélations mesurées sont les corrélations angulaires du profil transverse des photons intriqués<br>We shall present a theoretical description of paraxial beams, showing the propagation modes that arise from the solution of the paraxial equation in free space. We then discuss the angular momentum carried by light beams, with its decomposition in spin and orbital angular momentum and its quantization. We present the polarization and transverse modes of a beam as potential degrees of freedom to encode information. We define the Spin-Orbit modes and explain the experimental methods to produce such modes. We then apply the Spin-Orbit modes to perform a BB84 quantum key distribution protocol without a shared reference frame.We propose a Bell-like inequality criterion as a sufficient condition for the spin-orbit non-separability of a classical laser beam. We show that the notion of separable and non-separable spin-orbit modes in classical optics builds a useful analogy with entangled quantum states, allowing for the study of some of their important mathematical properties. We present a detailed quantum optical description of the experiment in which a comprehensive range of quantum states are considered.Following the study of Bell's inequalities we consider bipartite quantum systems characterized by a continuous angular variable θ. We show how to reveal non-locality on this type of system using inequalities similar to CHSH ones, originally derived for bipartite spin 1/2 like systems. Such inequalities involve correlated measurement of continuous angular functions and are equivalent to the continuous superposition of CHSH inequalities acting on two-dimensional subspaces of the infinite dimensional Hilbert space. As an example, we discuss in detail one application of our results, which consists in measuring orientation correlations on the transverse profile of entangled photons
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Optical cryptography"

1

Europe, SPIE, Akademie věd České republiky. Fyzikální ústav, and SPIE (Society), eds. Photon counting applications, quantum optics, and quantum information transfer and processing II: 20-21 April 2009, Prague, Czech Republic. SPIE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Buchmann, Johannes, Daniel J. Bernstein, and Erik Dahmen. Post-Quantum Cryptography. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buchmann, Johannes, Daniel J. Bernstein, and Erik Dahmen. Post-Quantum Cryptography. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Optical Coding Theory with Prime. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wiley Survival Guide in Global Telecommunications: Broadband Access, Optical Components and Networks, and Cryptography. Wiley-Interscience, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Optical Code Division Multiple Access Communication Networks: Theory and Applications. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Buchmann, Johannes, and Jintai Ding. Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nonlinear Laser Dynamics From Quantum Dots To Cryptography. Wiley-VCH Verlag GmbH, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ivan, Prochazka, Society of Photo-optical Instrumentation Engineers., SPIE Europe, and Society of Photo-optical Instrumentation Engineers. Czech Republic Chapter., eds. Photon counting applications, quantum optics, and quantum cryptography: 18-19 April 2007, Prague, Czech Republic. SPIE, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lepora, Nathan F. Decision making. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199674923.003.0028.

Full text
Abstract:
Decision making is the process by which alternatives are deliberated and chosen based on the values and goals of the decision maker. In this chapter, we describe recent progress in understanding how living organisms make decisions and the implications for engineering artificial systems with decision-making capabilities. Nature appears to re-use design principles for decision making across a hierarchy of organizational levels, from cells to organisms to entire populations. One common principle is that decision formation is realized by accumulating sensory evidence up to a threshold, approximating the optimal statistical technique of sequential analysis. Sequential analysis has applications spanning from cryptography to clinical drug testing. Artificial perception based on sequential analysis has advanced robot capabilities, enabling robust sensing under uncertainty. Future applications could lead to individual robots, or artificial swarms, that perceive and interact with complex environments with an ease and robustness now achievable only by living organisms.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Optical cryptography"

1

Desmedt, Yvo, Shuang Hou, and Jean Jacques Quisquater. "Audio and Optical Cryptography." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49649-1_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vijaywargi, Deepak, Dave Lewis, and Darko Kirovski. "Optical DNA." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03549-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nishchal, Naveen Kumar, and Areeba Fatima. "Phase Retrieval in Optical Cryptography." In Cryptographic and Information Security. CRC Press, 2018. http://dx.doi.org/10.1201/9780429435461-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cussey, Johann, Matthieu Bloch, Jean-Marc Merolla, and Steven W. McLaughlin. "Integrated Direct-Modulation Based Quantum Cryptography System." In Optical Networks and Technologies. Springer US, 2005. http://dx.doi.org/10.1007/0-387-23178-1_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Townsend, Paul D. "Quantum cryptography on optical fiber networks." In Euro-Par’98 Parallel Processing. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0057837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Faraj, Sufyan T., Fawzi Al-Naima, and Siddeeq Y. Ameen. "Optical Network Models for Quantum Cryptography." In IFIP Advances in Information and Communication Technology. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35586-3_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hughes, R. J., G. G. Luther, G. L. Morgan, C. G. Peterson, and C. Simmons. "Quantum Cryptography over Underground Optical Fibers." In Advances in Cryptology — CRYPTO ’96. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-68697-5_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Kehar. "Photorefractive Optical Cryptography: A Personal Tour." In Springer Proceedings in Physics. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3908-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hammouri, Ghaith, Aykutlu Dana, and Berk Sunar. "License Distribution Protocols from Optical Media Fingerprints." In Information Security and Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goedgebuer, J. P. "Non-quantum Cryptography for Secure Optical Communications." In Springer Series in OPTICAL SCIENCES. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48886-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Optical cryptography"

1

Chan, Vincent W. S. "Classical optical cryptography." In 2015 17th International Conference on Transparent Optical Networks (ICTON). IEEE, 2015. http://dx.doi.org/10.1109/icton.2015.7193389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gisin, Nicolas. "Quantum optical cryptography." In Frontiers in Optics. OSA, 2003. http://dx.doi.org/10.1364/fio.2003.thkk1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poon, Ting-Chung. "Optical scanning cryptography." In Optical Science and Technology, SPIE's 48th Annual Meeting, edited by Frank Wyrowski. SPIE, 2004. http://dx.doi.org/10.1117/12.511848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arenas-Pingarrón, Álvaro, Ana P. González-Marcos, José M. Rivas-Moscoso, and José A. Martín-Pereda. "Optical digital chaos cryptography." In Optics/Photonics in Security and Defence, edited by Colin Lewis. SPIE, 2007. http://dx.doi.org/10.1117/12.737789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Quantum Optical Cryptography and SETI." In 55th International Astronautical Congress of the International Astronautical Federation, the International Academy of Astronautics, and the International Institute of Space Law. American Institute of Aeronautics and Astronautics, 2004. http://dx.doi.org/10.2514/6.iac-04-iaa.1.1.1.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adamski, Tomasz. "Introduction to optical quantum cryptography." In SPIE Proceedings, edited by Ryszard S. Romaniuk. SPIE, 2007. http://dx.doi.org/10.1117/12.784761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goedgebuer, Jean-Pierre, Pascal Levy, and Laurent Larger. "Laser cryptography by optical chaos." In International Conference on Lasers, Applications, and Technologies 2002, edited by Jean-Pierre Goedgebuer, N. N. Rozanov, S. K. Turitsyn, Alexander S. Akhmanov, and Vladislav Y. Panchenko. SPIE, 2003. http://dx.doi.org/10.1117/12.517932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zbinden, H., G. Ribordy, and D. Stucki. "Components for quantum cryptography." In OFCNFOEC 2006. 2006 Optical Fiber Communication Conference and the National Fiber Optic Engineers Conference. IEEE, 2006. http://dx.doi.org/10.1109/ofc.2006.215484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jeffrey, Evan R., Matthew W. Brenner, and Paul G. Kwiat. "Delayed-choice quantum cryptography." In Optical Science and Technology, SPIE's 48th Annual Meeting, edited by Ronald E. Meyers and Yanhua Shih. SPIE, 2004. http://dx.doi.org/10.1117/12.512322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yan, Aimin, Zhijuan Hu, Peter Wai Ming Tsang, and Ting-Chung Poon. "Optical cryptography with biometrics and optical scanning holography." In Digital Holography and Three-Dimensional Imaging. OSA, 2018. http://dx.doi.org/10.1364/dh.2018.dth2e.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Optical cryptography"

1

Hughes, R. J., G. G. Luther, G. L. Morgan, C. G. Peterson, and C. Simmons. Quantum cryptography over underground optical fibers. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/251411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!