Logo

Visual Cryptography and Its Applications

Small book cover: Visual Cryptography and Its Applications

Visual Cryptography and Its Applications
by

Publisher: BookBoon
ISBN-13: 9788740301267
Number of pages: 144

Description:
Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed exactly together, the original secret can be discovered without computer participation.

Home page url

Download or read it online for free here:
Download link
(6.2MB, PDF)

Similar books

Book cover: A brief introduction of quantum cryptography for engineersA brief introduction of quantum cryptography for engineers
by - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(15679 views)
Book cover: Cryptography, A Study on Secret WritingsCryptography, A Study on Secret Writings
by - Aegean Park Press
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(23226 views)
Book cover: Fundamentals of Cryptology: A Professional Reference and Interactive TutorialFundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(17487 views)
Book cover: Public-Key Cryptography: Theory and PracticePublic-Key Cryptography: Theory and Practice
by - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(15397 views)