Visual Public-Key Cryptosystems.
Many public-key cryptosystems are being used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem withou...
| Main Author: | |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
Universiti Sains Malaysia
2012
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/37077/ http://eprints.usm.my/37077/1/224e%20Visual%20Public-Key%20Cryptossystems..pdf |
| _version_ | 1848878090830217216 |
|---|---|
| author | Samsudin, Azman |
| author_facet | Samsudin, Azman |
| author_sort | Samsudin, Azman |
| building | USM Institutional Repository |
| collection | Online Access |
| description | Many public-key cryptosystems are being used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it
necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations. |
| first_indexed | 2025-11-15T17:25:49Z |
| format | Monograph |
| id | usm-37077 |
| institution | Universiti Sains Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T17:25:49Z |
| publishDate | 2012 |
| publisher | Universiti Sains Malaysia |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | usm-370772022-12-14T08:00:07Z http://eprints.usm.my/37077/ Visual Public-Key Cryptosystems. Samsudin, Azman QA75.5-76.95 Electronic computers. Computer science Many public-key cryptosystems are being used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations. Universiti Sains Malaysia 2012 Monograph NonPeerReviewed application/pdf en http://eprints.usm.my/37077/1/224e%20Visual%20Public-Key%20Cryptossystems..pdf Samsudin, Azman (2012) Visual Public-Key Cryptosystems. Technical Report. Universiti Sains Malaysia. |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Samsudin, Azman Visual Public-Key Cryptosystems. |
| title | Visual Public-Key Cryptosystems. |
| title_full | Visual Public-Key Cryptosystems. |
| title_fullStr | Visual Public-Key Cryptosystems. |
| title_full_unstemmed | Visual Public-Key Cryptosystems. |
| title_short | Visual Public-Key Cryptosystems. |
| title_sort | visual public-key cryptosystems. |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://eprints.usm.my/37077/ http://eprints.usm.my/37077/1/224e%20Visual%20Public-Key%20Cryptossystems..pdf |