1. bookVolumen 3 (2016): Edición 6 (December 2016)
Detalles de la revista
License
Formato
Revista
eISSN
2182-1976
Primera edición
16 Apr 2016
Calendario de la edición
2 veces al año
Idiomas
Inglés
Acceso abierto

Quantum Distribution of a Sudoku Key

Publicado en línea: 08 Dec 2016
Volumen & Edición: Volumen 3 (2016) - Edición 6 (December 2016)
Páginas: 87 - 94
Detalles de la revista
License
Formato
Revista
eISSN
2182-1976
Primera edición
16 Apr 2016
Calendario de la edición
2 veces al año
Idiomas
Inglés

[1] C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner.“Quantum cryptography, or unforgeable subway tokens”, in D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, 267-275, Springer US, 1983.10.1007/978-1-4757-0602-4_26Search in Google Scholar

[2] C. H. Bennett and G. Brassard.“Quantum cryptography: Public key distribution and coin tossing”, IEEE International Conference on Computers, Systems, and Signal Processing, p. 175, Bangalore, 1984.Search in Google Scholar

[3] C. Chang, Y. Chou, and T. D. Kieu.“An information hiding scheme using Sudoku”, ICICIC '08: Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, p. 17, Washington, DC, USA, 2008.10.1109/ICICIC.2008.149Search in Google Scholar

[4] S. Gupta.“Some results on Su Doku”. http://theory.tifr.res.in/~sgupta/sudoku/theorems.pdf (March 2006)Search in Google Scholar

[5] W. Hong, T. Chen, and C. Shiu.“Steganography using Sudoku revisited”, Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on Intelligent Information Technology Application (IITA'2008), 935-939, Shanghai, 2008.10.1109/IITA.2008.445Search in Google Scholar

[6] G. Royle.“Combinatorial concepts with Sudoku I: Symmetry”. http://people.csse.uwa.edu.au/gordon/sudoku/sudoku-symmetry.pdf (March 2006)Search in Google Scholar

[7] M. H. Shirali-Shahreza and M. Shirali-Shahreza.“Steganography in SMS by Sudoku puzzle”, 6th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2008), 844-847, Doha, Qatar, March 31 - April 4, 2008.10.1109/AICCSA.2008.4493626Search in Google Scholar

[8] S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, Doubleday, New York, USA, 1st edition, 1999.Search in Google Scholar

[9] J. Watrous.“Zero-knowledge against quantum attacks”, Proceedings of the 38th ACM Symposium on Theory of Computing, pages 296-305. ACM Press, New York, 2006.10.1145/1132516.1132560Search in Google Scholar

[10] H. Wien, C. Tung-Shou, and S. Chih-Wei.“A minimal euclidean distance searching technique for sudoku steganography”, ISISE '08. International Symposium on Information Science and Engieering, pages 515-518, 2008.Search in Google Scholar

[11] Y. Wu, J. Noonan, and S. Agaian. Binary data encryption using the sudoku block cipher, 3915 -3921, 2010. 10.1117/12.853197Search in Google Scholar

Artículos recomendados de Trend MD

Planifique su conferencia remota con Sciendo