A multisecret sharing scheme for color images based on cellular automata
暂无分享,去创建一个
Gonzalo Álvarez | Ángel Martín del Rey | Luis Hernández Encinas | G. Álvarez | L. H. Encinas | Á. M. D. Rey
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[3] Ángel Martín del Rey,et al. Wolfram cellular auto mata and their cryptographic use as pseudorandom bit generators , 2003 .
[4] Zhenfu Cao,et al. Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..
[5] Ali Aydin Selçuk,et al. Threshold cryptography based on Asmuth-Bloom secret sharing , 2007, Inf. Sci..
[6] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[7] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[8] Willi Meier,et al. Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.
[9] Hiroki Koga,et al. Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels , 2006, Des. Codes Cryptogr..
[10] N. Margolus,et al. Invertible cellular automata: a review , 1991 .
[11] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[12] Edward Fredkin,et al. Digital mechanics , 1991 .
[13] Puhua Guan,et al. Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..
[14] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[15] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[16] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] L. Harn. Efficient sharing (broadcasting) of multiple secrets , 1995 .
[19] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[20] Ramón Alonso-Sanz,et al. Reversible cellular automata with memory: two-dimensional patterns from a single site seed , 2003 .
[21] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[22] Yen-Ping Chu,et al. A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..
[23] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[24] Chin-Chen Chang,et al. An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..
[25] Ángel Martín del Rey,et al. A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata , 2005, IbPRIA.
[26] L. Harn,et al. Comment on "Multistage secret sharing based on one-way function" , 1995 .
[27] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[28] Lakhmi C. Jain,et al. Multiuser-based shadow watermark extraction system , 2007, Inf. Sci..
[29] E. Fredkin. Digital mechanics: an informational process based on reversible universal cellular automata , 1990 .
[30] Ángel Martín del Rey,et al. The Use of Linear Hybrid Cellular Automata as Pseudo Random Bit Generators in Cryptography , 2004, Neural Parallel Sci. Comput..
[31] Chin-Chen Chang,et al. An on-line secret sharing scheme for multi-secrets , 1998, Comput. Commun..
[32] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[33] Wen-Guey Tzeng,et al. Optimal resilient threshold GQ signatures , 2007, Inf. Sci..
[34] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[35] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[36] Feng Bao. Cryptanalysis of a Partially Known Cellular Automata Cryptosystem , 2004, IEEE Trans. Computers.
[37] Chin-Chen Chang,et al. Sharing multiple secrets in digital images , 2002, J. Syst. Softw..
[38] Santanu Chattopadhyay,et al. Additive cellular automata : theory and applications , 1997 .
[39] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.