[[1] C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner.“Quantum cryptography, or unforgeable subway tokens”, in D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, 267-275, Springer US, 1983.10.1007/978-1-4757-0602-4_26]Search in Google Scholar
[[2] C. H. Bennett and G. Brassard.“Quantum cryptography: Public key distribution and coin tossing”, IEEE International Conference on Computers, Systems, and Signal Processing, p. 175, Bangalore, 1984.]Search in Google Scholar
[[3] C. Chang, Y. Chou, and T. D. Kieu.“An information hiding scheme using Sudoku”, ICICIC '08: Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, p. 17, Washington, DC, USA, 2008.10.1109/ICICIC.2008.149]Search in Google Scholar
[[4] S. Gupta.“Some results on Su Doku”. http://theory.tifr.res.in/~sgupta/sudoku/theorems.pdf (March 2006)]Search in Google Scholar
[[5] W. Hong, T. Chen, and C. Shiu.“Steganography using Sudoku revisited”, Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on Intelligent Information Technology Application (IITA'2008), 935-939, Shanghai, 2008.10.1109/IITA.2008.445]Search in Google Scholar
[[6] G. Royle.“Combinatorial concepts with Sudoku I: Symmetry”. http://people.csse.uwa.edu.au/gordon/sudoku/sudoku-symmetry.pdf (March 2006)]Search in Google Scholar
[[7] M. H. Shirali-Shahreza and M. Shirali-Shahreza.“Steganography in SMS by Sudoku puzzle”, 6th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2008), 844-847, Doha, Qatar, March 31 - April 4, 2008.10.1109/AICCSA.2008.4493626]Search in Google Scholar
[[8] S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, Doubleday, New York, USA, 1st edition, 1999.]Search in Google Scholar
[[9] J. Watrous.“Zero-knowledge against quantum attacks”, Proceedings of the 38th ACM Symposium on Theory of Computing, pages 296-305. ACM Press, New York, 2006.10.1145/1132516.1132560]Search in Google Scholar
[[10] H. Wien, C. Tung-Shou, and S. Chih-Wei.“A minimal euclidean distance searching technique for sudoku steganography”, ISISE '08. International Symposium on Information Science and Engieering, pages 515-518, 2008.]Search in Google Scholar
[[11] Y. Wu, J. Noonan, and S. Agaian. Binary data encryption using the sudoku block cipher, 3915 -3921, 2010. 10.1117/12.853197]Search in Google Scholar