• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4593037)   Today's Articles (3978)   Subscriber (49318)
For: Meng XF, Peng X, Cai LZ, Li AM, Gao Z, Wang YR. Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm. ACTA ACUST UNITED AC 2009. [DOI: 10.1088/1464-4258/11/8/085402] [Citation(s) in RCA: 18] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
Number Cited by Other Article(s)
1
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm. Sci Rep 2022;12:7722. [PMID: 35545658 PMCID: PMC9095651 DOI: 10.1038/s41598-022-11861-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/07/2021] [Accepted: 04/27/2022] [Indexed: 11/26/2022]  Open
2
Asymmetric Encryption of Invisible Structured Light 3D Imaging. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12073563] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
3
Moon I, Yi F, Han M, Lee J. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. APPLIED OPTICS 2016;55:4328-4335. [PMID: 27411183 DOI: 10.1364/ao.55.004328] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
4
Lai H, He W, Peng X. Optical Hash function based on two-beam interference. APPLIED OPTICS 2013;52:6213-6219. [PMID: 24085079 DOI: 10.1364/ao.52.006213] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/22/2013] [Accepted: 07/30/2013] [Indexed: 06/02/2023]
5
Das B, Yelleswarapu CS, Rao DVGLN. Dual-channel in-line digital holographic double random phase encryption. OPTICS COMMUNICATIONS 2012;285:4262-4267. [PMID: 23471012 PMCID: PMC3587054 DOI: 10.1016/j.optcom.2012.06.056] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
6
Chen W, Chen X. Space-based optical image encryption. OPTICS EXPRESS 2010;18:27095-104. [PMID: 21196985 DOI: 10.1364/oe.18.027095] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/11/2023]
7
Niu CH, Wang XL, Lv NG, Zhou ZH, Li XY. An encryption method with multiple encrypted keys based on interference principle. OPTICS EXPRESS 2010;18:7827-7834. [PMID: 20588624 DOI: 10.1364/oe.18.007827] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/29/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA