Visual Cryptography and Its Applications
by Jonathan Weir, WeiQi Yan
Publisher: BookBoon 2012
ISBN-13: 9788740301267
Number of pages: 144
Description:
Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed exactly together, the original secret can be discovered without computer participation.
Download or read it online for free here:
Download link
(6.2MB, PDF)
Similar books
Hacking Secret Ciphers with Python
by Al Sweigart
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(4611 views)
by Al Sweigart
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(4611 views)
Cracking Codes with Python
by Al Sweigart - inventwithpython.com
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
(561 views)
by Al Sweigart - inventwithpython.com
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
(561 views)
Basic Cryptanalysis
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(8030 views)
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(8030 views)
Mathematical Cryptology
by Keijo Ruohonen - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(6137 views)
by Keijo Ruohonen - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(6137 views)