Journal articles on the topic 'Optical cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Optical cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Hong-Chao, and Wen Chen. "Optical ghost cryptography and steganography." Optics and Lasers in Engineering 130 (July 2020): 106094. http://dx.doi.org/10.1016/j.optlaseng.2020.106094.
Full textShi, Yishi, and Xiubo Yang. "Optical hiding with visual cryptography." Journal of Optics 19, no. 11 (2017): 115703. http://dx.doi.org/10.1088/2040-8986/aa895e.
Full textDONATI Silvano, 唐士文, ANNOVAZZI-LODI Valerio ANNOVAZZI-LODI Valerio, and 王昭 WANG Zhao. "Recent advances in optical cryptography." Chinese Journal of Optics and Applied Optics 7, no. 1 (2014): 89–97. http://dx.doi.org/10.3788/co.20140701.0089.
Full textFranson, J. D., and H. Ilves. "Quantum cryptography using optical fibers." Applied Optics 33, no. 14 (1994): 2949. http://dx.doi.org/10.1364/ao.33.002949.
Full textTownsend, Paul D. "Quantum Cryptography on Optical Fiber Networks." Optical Fiber Technology 4, no. 4 (1998): 345–70. http://dx.doi.org/10.1006/ofte.1998.0270.
Full textOgura, Yusuke, Masahiko Aino, and Jun Tanida. "Microscale optical cryptography using a subdiffraction-limit optical key." Japanese Journal of Applied Physics 57, no. 4 (2018): 040309. http://dx.doi.org/10.7567/jjap.57.040309.
Full textPham, Hai, Rainer Steinwandt, and Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme." Entropy 21, no. 9 (2019): 872. http://dx.doi.org/10.3390/e21090872.
Full textAswad, Firas Mohammed, Ihsan Salman, and Salama A. Mostafa. "An optimization of color halftone visual cryptography scheme based on Bat algorithm." Journal of Intelligent Systems 30, no. 1 (2021): 816–35. http://dx.doi.org/10.1515/jisys-2021-0042.
Full textLiñares-Beiras, Jesús, Xesús Prieto-Blanco, Daniel Balado, and Gabriel M. Carral. "Autocompensating Measurement-Device-Independent quantum cryptography in few-mode optical fibers." EPJ Web of Conferences 238 (2020): 09002. http://dx.doi.org/10.1051/epjconf/202023809002.
Full textChang, Xiangyu, Aimin Yan, and Hongbo Zhang. "Ciphertext-only attack on optical scanning cryptography." Optics and Lasers in Engineering 126 (March 2020): 105901. http://dx.doi.org/10.1016/j.optlaseng.2019.105901.
Full textPhoenix, Simon J. D., Stephen M. Barnett, Paul D. Townsend, and K. J. Blow. "Multi-user Quantum Cryptography on Optical Networks." Journal of Modern Optics 42, no. 6 (1995): 1155–63. http://dx.doi.org/10.1080/09500349514551001.
Full textTownsend, Paul D. "Quantum cryptography on multiuser optical fibre networks." Nature 385, no. 6611 (1997): 47–49. http://dx.doi.org/10.1038/385047a0.
Full textPoon, Ting-Chung, Taegeun Kim, and Kyu Doh. "Optical scanning cryptography for secure wireless transmission." Applied Optics 42, no. 32 (2003): 6496. http://dx.doi.org/10.1364/ao.42.006496.
Full textVIDAL, G., M. S. BAPTISTA, and H. MANCINI. "FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES." International Journal of Bifurcation and Chaos 22, no. 10 (2012): 1250243. http://dx.doi.org/10.1142/s0218127412502434.
Full textRisk, William P., and Donald S. Bethune. "Quantum Cryptography." Optics and Photonics News 13, no. 7 (2002): 26. http://dx.doi.org/10.1364/opn.13.7.000026.
Full textFranson, J. D. "Quantum Cryptography." Optics and Photonics News 6, no. 3 (1995): 30. http://dx.doi.org/10.1364/opn.6.3.000030.
Full textHoroshko, D. B., and S. Ya Kilin. "Optimal dimensionality for quantum cryptography." Optics and Spectroscopy 94, no. 5 (2003): 691–94. http://dx.doi.org/10.1134/1.1576836.
Full textYu, Tao, Dong-Yu Yang, Rui Ma, Yu-Peng Zhu, and Yi-Shi Shi. "Enhanced-visual-cryptography-based optical information hiding system." Acta Physica Sinica 69, no. 14 (2020): 144202. http://dx.doi.org/10.7498/aps.69.20200496.
Full textChrien, Thomas G., and George M. Morris. "Optical cryptography using a multifaceted reference-beam hologram." Applied Optics 24, no. 7 (1985): 933. http://dx.doi.org/10.1364/ao.24.000933.
Full textBreguet, J., A. Muller, and N. Gisin. "Quantum Cryptography with Polarized Photons in Optical Fibres." Journal of Modern Optics 41, no. 12 (1994): 2405–12. http://dx.doi.org/10.1080/09500349414552251.
Full textYan, Aimin, Jianfeng Sun, Zhijuan Hu, Jingtao Zhang, and Liren Liu. "Novel optical scanning cryptography using Fresnel telescope imaging." Optics Express 23, no. 14 (2015): 18428. http://dx.doi.org/10.1364/oe.23.018428.
Full textMuruganantham, B., P. Shamili, S. Ganesh Kumar, and A. Murugan. "Quantum cryptography for secured communication networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 407. http://dx.doi.org/10.11591/ijece.v10i1.pp407-414.
Full textBykovsky, A. Yu, and I. N. Kompanets. "Quantum cryptography and combined schemes of quantum cryptography communication networks." Quantum Electronics 48, no. 9 (2018): 777–801. http://dx.doi.org/10.1070/qel16732.
Full textAbbade, M. L. F., L. A. Fossaluzza Jr., C. A. Messani, G. M. Taniguti, E. A. M. Fagotto, and I. E. Fonseca. "All-optical cryptography through spectral amplitude and delay encoding." Journal of Microwaves, Optoelectronics and Electromagnetic Applications 12, no. 2 (2013): 376–97. http://dx.doi.org/10.1590/s2179-10742013000200011.
Full textPetrauskiene, Vilma, Arvydas Survila, Algimantas Fedaravicius, and Minvydas Ragulskis. "Dynamic visual cryptography for optical assessment of chaotic oscillations." Optics & Laser Technology 57 (April 2014): 129–35. http://dx.doi.org/10.1016/j.optlastec.2013.10.015.
Full textPan, Zilan, and Leihong Zhang. "Optical Cryptography-Based Temporal Ghost Imaging With Chaotic Laser." IEEE Photonics Technology Letters 29, no. 16 (2017): 1289–92. http://dx.doi.org/10.1109/lpt.2017.2703838.
Full textTownsend, P. D., S. J. D. Phoenix, S. M. Barnett, and K. J. Blow. "Design of quantum cryptography systems for passive optical networks." Electronics Letters 30, no. 22 (1994): 1875–77. http://dx.doi.org/10.1049/el:19941255.
Full textTao Ye, 陶冶, 祝玉鹏 Zhu Yupeng, 杨栋宇 Yang Dongyu, 吕文晋 Lü Wenjin та 史祎诗 Shi Yishi. "基于视觉密码的远距离光学信息认证系统". Acta Optica Sinica 41, № 16 (2021): 1607001. http://dx.doi.org/10.3788/aos202141.1607001.
Full textCHEN, Wen, and Xudong CHEN. "OS10F070 Optical Cryptography Using a Three-Dimensional Space-Based Strategy and Phase-Shifting Digital Holography." Abstracts of ATEM : International Conference on Advanced Technology in Experimental Mechanics : Asian Conference on Experimental Mechanics 2011.10 (2011): _OS10F070——_OS10F070—. http://dx.doi.org/10.1299/jsmeatem.2011.10._os10f070-.
Full textPetrauskiene, Vilma, Algiment Aleksa, Algimantas Fedaravicius, and Minvydas Ragulskis. "Dynamic visual cryptography for optical control of vibration generation equipment." Optics and Lasers in Engineering 50, no. 6 (2012): 869–76. http://dx.doi.org/10.1016/j.optlaseng.2012.01.013.
Full textYi, Kang, Zhang Leihong, and Zhang Dawei. "Optical encryption based on ghost imaging and public key cryptography." Optics and Lasers in Engineering 111 (December 2018): 58–64. http://dx.doi.org/10.1016/j.optlaseng.2018.07.014.
Full textXomalis, Angelos, Iosif Demirtzioglou, Yongmin Jung, et al. "Cryptography in coherent optical information networks using dissipative metamaterial gates." APL Photonics 4, no. 4 (2019): 046102. http://dx.doi.org/10.1063/1.5092216.
Full textChen, Wen, and Xudong Chen. "Optical asymmetric cryptography using a three-dimensional space-based model." Journal of Optics 13, no. 7 (2011): 075404. http://dx.doi.org/10.1088/2040-8978/13/7/075404.
Full textChen, W. "Optical asymmetric cryptography using a three-dimensional space-based model." Journal of Optics 13, no. 7 (2011): 079601. http://dx.doi.org/10.1088/2040-8978/13/7/079601.
Full textYi, Sang-Yi, Sung-Min Wi, Seung-Hyun Lee, Ji-Sang Yoo, and Dong-Wook Kim. "Optical Visual Cryptography using the Characteristics of Spatial Light Modulation." Hankook Kwanghak Hoeji 18, no. 3 (2007): 202–7. http://dx.doi.org/10.3807/hkh.2007.18.3.202.
Full textGil, Sang Keun. "Asymmetric Public Key Cryptography by Using Logic-based Optical Processing." Journal of the Optical Society of Korea 20, no. 1 (2016): 55–63. http://dx.doi.org/10.3807/josk.2016.20.1.055.
Full textHuttner, B., A. Muller, G. Ribordy, W. Tittel, H. Zbinden, and N. Gisin. "“Plug and Play” Quantum Cryptography." Optics and Photonics News 8, no. 12 (1997): 38. http://dx.doi.org/10.1364/opn.8.12.000038.
Full textPutthacharoen, Rattipong. "Novel optical cryptography using PANDA ring resonator for highly secured communication." Optical Engineering 50, no. 7 (2011): 075001. http://dx.doi.org/10.1117/1.3595425.
Full textCai, Jianjun, Xueju Shen, and Ming Lei. "Optical asymmetric cryptography based on amplitude reconstruction of elliptically polarized light." Optics Communications 403 (November 2017): 211–16. http://dx.doi.org/10.1016/j.optcom.2017.07.049.
Full textXu, Qing, Manuel Sabban, and Philippe Gallion. "Homodyne detection of weak coherent optical pulse: Applications to quantum cryptography." Microwave and Optical Technology Letters 51, no. 8 (2009): 1934–39. http://dx.doi.org/10.1002/mop.24471.
Full textBalygin, K. A., A. N. Klimov, S. P. Kulik, and S. N. Molotkov. "Active stabilization of the optical part in fiber optic quantum cryptography." JETP Letters 103, no. 6 (2016): 420–24. http://dx.doi.org/10.1134/s0021364016060023.
Full textLiñares-Beiras, Jesús, Xesús Prieto-Blanco, Daniel Balado, and Gabriel M. Carral. "Autocompensating high-dimensional quantum cryptography by phase conjugation in optical fibers." EPJ Web of Conferences 238 (2020): 11004. http://dx.doi.org/10.1051/epjconf/202023811004.
Full textPetrauskiene, Vilma, and Loreta Saunoriene. "Application of dynamic visual cryptography for optical control of chaotic oscillations." Vibroengineering PROCEDIA 15 (December 1, 2017): 81–87. http://dx.doi.org/10.21595/vp.2017.19353.
Full textCHEN, Wen, and Xudong CHEN. "OS010-2-1 Optical Cryptography Using a Three-Dimensional Space-Based Strategy and Phase-Shifting Digital Holography." Abstracts of ATEM : International Conference on Advanced Technology in Experimental Mechanics : Asian Conference on Experimental Mechanics 2011.10 (2011): _OS010–2–1. http://dx.doi.org/10.1299/jsmeatem.2011.10._os010-2-1.
Full textKurochkin, V. L., A. V. Zverev, Yu V. Kurochkin, I. I. Ryabtsev, and I. G. Neizvestny. "Experimental studies in quantum cryptography." Russian Microelectronics 40, no. 4 (2011): 245–53. http://dx.doi.org/10.1134/s1063739711040068.
Full textHUTTNER, BRUNO, NOBUYUKI IMOTO, and STEVE M. BARNETT. "SHORT DISTANCE APPLICATIONS OF QUANTUM CRYPTOGRAPHY." Journal of Nonlinear Optical Physics & Materials 05, no. 04 (1996): 823–32. http://dx.doi.org/10.1142/s0218863596000581.
Full textLuo, Yuhui, and Kam Tai Chan. "Quantum cryptography with perfect multiphoton entanglement." Journal of the Optical Society of America A 22, no. 5 (2005): 1003. http://dx.doi.org/10.1364/josaa.22.001003.
Full textDomb, Menachem, and Guy Leshem. "Secured Key Distribution by Concatenating Optical Communications and Inter-Device Hand-Held Video Transmission." Applied System Innovation 3, no. 1 (2020): 11. http://dx.doi.org/10.3390/asi3010011.
Full textLi, Wei, Xiangyu Chang, Aimin Yan, and Hongbo Zhang. "Asymmetric multiple image elliptic curve cryptography." Optics and Lasers in Engineering 136 (January 2021): 106319. http://dx.doi.org/10.1016/j.optlaseng.2020.106319.
Full textWang, Ren-De, Ya-Ping Zhang, Xu-Feng Zhu, et al. "Multi-section images parallel encryption based on optical scanning holographic cryptography technology." Acta Physica Sinica 68, no. 11 (2019): 114202. http://dx.doi.org/10.7498/aps.68.20190162.
Full text