共 17 条
[1]
BAKHTIARI S, 1996, LECT NOTES COMPUT SC, V1029, P1611
[2]
Javidi B., 2005, Optical and Digital Techniques for Information Security
[3]
Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm
[J].
JOURNAL OF OPTICS A-PURE AND APPLIED OPTICS,
2009, 11 (08)
[4]
Merkle R. C., 1990, Journal of Cryptology, V3, P43, DOI 10.1007/BF00203968
[5]
National Institute of Standards and Technology (NIST), 1994, NIST FIPS PUB, V186
[6]
Information security system based on virtual-optics imaging methodology and public key infrastructure
[J].
OPTIK,
2004, 115 (09)
:420-426
[7]
Asymmetric cryptography based on wavefront sensing
[J].
OPTICS LETTERS,
2006, 31 (24)
:3579-3581
[8]
Preneel B, 1993, Analysis and design of cryptographic hash functions
[10]
Rivest R., 1992, 1321 RFC INT ACT BOA