XOR-based Visual Cryptography Schemes

Designs, Codes and Cryptography - Tập 37 Số 1 - Trang 169-186 - 2005
Pim Tuyls, Henk D. L. Hollmann1, J. H. van Lint2, Ludo Tolhuizen1
1Philips Research Laboratories, Eindhoven, The Netherlands
2Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands

Tóm tắt

Từ khóa


Tài liệu tham khảo

B. Arazi, 1989, IEEE Transactions on Systems, Man and Cybernetics., 19, 1016, 10.1109/21.44016

Biham E., Itzkovitz A. Visual Cryptography with Polarization, http://www.cs.technion.ac.il/ biham/ Reports/visual.ps.gz. (1997)

C. Blundo, 1999, Journal Cryptology., 12, 261, 10.1007/s001459900057

Droste C. (1996). New Results on Visual Cryptography. Crypto 96, LNCS. 1109: 401–415 Springer-Verlag

-S. Lee S, 2002, ETRI Journal., 24, 373, 10.4218/etrij.02.0102.0505

F.J. MacWilliams, 1977, The Theory of Error-Correcting Codes

Naor M., Shamir A. (1994). Visual Cryptography, Eurocrypt 94, LNCS, Vol. 950, Springer-Verlag, pp. 1–12

Naor M., Pinkas B. Visual Authentication and Identification, Crypto 97

A. Santis de, 1998, On Visual Cryptography Schemes, 154

D. R. Stinson, An Introduction to Visual Cryptography, presented at Public Key solutions ’97. Available at http://bibd.unl.edu/ stinson/VCS-PKS.ps. (1997).

P. Tuyls, T. Kevenaar, G. J. Schrijen, A. A. M. Staring and M. van Dijk, Visual crypto displays enabling secure communications, In Security in Pervasive Computing, LNCS2802, pp. 271–284. (2003).

E. Verheul, 1997, Designs Codes and Cryptography., 11, 179, 10.1023/A:1008280705142

J. Riordan, 1979, Combinatorial Identities

R.L. Graham, D. E. Knuth and O. Patashnik, Concrete Mathematics: A Foundation for Computer Science, Addison-Wesley (1992).