Visual Public-Key Cryptosystems.

Many public-key cryptosystems are being used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem withou...

Full description

Saved in:
Bibliographic Details
Main Author: Samsudin, Azman
Format: Monograph
Language:en
Published: Universiti Sains Malaysia 2012
Subjects:
Online Access:http://eprints.usm.my/37077/1/224e%20Visual%20Public-Key%20Cryptossystems..pdf
http://eprints.usm.my/37077/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1834501132446072832
author Samsudin, Azman
author_facet Samsudin, Azman
author_sort Samsudin, Azman
building Hamzah Sendut Library
collection Institutional Repository
content_provider Universiti Sains Malaysia
content_source USM Institutional Repository
continent Asia
country Malaysia
description Many public-key cryptosystems are being used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations.
format Monograph
id my.usm.eprints.37077
institution Universiti Sains Malaysia
language en
publishDate 2012
publisher Universiti Sains Malaysia
record_format eprints
spelling my.usm.eprints.37077 http://eprints.usm.my/37077/ Visual Public-Key Cryptosystems. Samsudin, Azman QA75.5-76.95 Electronic computers. Computer science Many public-key cryptosystems are being used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations. Universiti Sains Malaysia 2012 Monograph NonPeerReviewed application/pdf en http://eprints.usm.my/37077/1/224e%20Visual%20Public-Key%20Cryptossystems..pdf Samsudin, Azman (2012) Visual Public-Key Cryptosystems. Technical Report. Universiti Sains Malaysia.
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Samsudin, Azman
Visual Public-Key Cryptosystems.
title Visual Public-Key Cryptosystems.
title_full Visual Public-Key Cryptosystems.
title_fullStr Visual Public-Key Cryptosystems.
title_full_unstemmed Visual Public-Key Cryptosystems.
title_short Visual Public-Key Cryptosystems.
title_sort visual public-key cryptosystems.
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/37077/1/224e%20Visual%20Public-Key%20Cryptossystems..pdf
http://eprints.usm.my/37077/
url_provider http://eprints.usm.my/