1. bookVolume 3 (2016): Edition 6 (December 2016)
Détails du magazine
License
Format
Magazine
eISSN
2182-1976
Première parution
16 Apr 2016
Périodicité
2 fois par an
Langues
Anglais
Accès libre

Quantum Distribution of a Sudoku Key

Publié en ligne: 08 Dec 2016
Volume & Edition: Volume 3 (2016) - Edition 6 (December 2016)
Pages: 87 - 94
Détails du magazine
License
Format
Magazine
eISSN
2182-1976
Première parution
16 Apr 2016
Périodicité
2 fois par an
Langues
Anglais

[1] C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner.“Quantum cryptography, or unforgeable subway tokens”, in D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, 267-275, Springer US, 1983.10.1007/978-1-4757-0602-4_26Search in Google Scholar

[2] C. H. Bennett and G. Brassard.“Quantum cryptography: Public key distribution and coin tossing”, IEEE International Conference on Computers, Systems, and Signal Processing, p. 175, Bangalore, 1984.Search in Google Scholar

[3] C. Chang, Y. Chou, and T. D. Kieu.“An information hiding scheme using Sudoku”, ICICIC '08: Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, p. 17, Washington, DC, USA, 2008.10.1109/ICICIC.2008.149Search in Google Scholar

[4] S. Gupta.“Some results on Su Doku”. http://theory.tifr.res.in/~sgupta/sudoku/theorems.pdf (March 2006)Search in Google Scholar

[5] W. Hong, T. Chen, and C. Shiu.“Steganography using Sudoku revisited”, Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on Intelligent Information Technology Application (IITA'2008), 935-939, Shanghai, 2008.10.1109/IITA.2008.445Search in Google Scholar

[6] G. Royle.“Combinatorial concepts with Sudoku I: Symmetry”. http://people.csse.uwa.edu.au/gordon/sudoku/sudoku-symmetry.pdf (March 2006)Search in Google Scholar

[7] M. H. Shirali-Shahreza and M. Shirali-Shahreza.“Steganography in SMS by Sudoku puzzle”, 6th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2008), 844-847, Doha, Qatar, March 31 - April 4, 2008.10.1109/AICCSA.2008.4493626Search in Google Scholar

[8] S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, Doubleday, New York, USA, 1st edition, 1999.Search in Google Scholar

[9] J. Watrous.“Zero-knowledge against quantum attacks”, Proceedings of the 38th ACM Symposium on Theory of Computing, pages 296-305. ACM Press, New York, 2006.10.1145/1132516.1132560Search in Google Scholar

[10] H. Wien, C. Tung-Shou, and S. Chih-Wei.“A minimal euclidean distance searching technique for sudoku steganography”, ISISE '08. International Symposium on Information Science and Engieering, pages 515-518, 2008.Search in Google Scholar

[11] Y. Wu, J. Noonan, and S. Agaian. Binary data encryption using the sudoku block cipher, 3915 -3921, 2010. 10.1117/12.853197Search in Google Scholar

Articles recommandés par Trend MD

Planifiez votre conférence à distance avec Sciendo