Logo

Visual Cryptography and Its Applications

Small book cover: Visual Cryptography and Its Applications

Visual Cryptography and Its Applications
by

Publisher: BookBoon
ISBN-13: 9788740301267
Number of pages: 144

Description:
Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed exactly together, the original secret can be discovered without computer participation.

Home page url

Download or read it online for free here:
Download link
(6.2MB, PDF)

Similar books

Book cover: Fundamentals of Cryptology: A Professional Reference and Interactive TutorialFundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(8953 views)
Book cover: The Laws of Cryptography with Java CodeThe Laws of Cryptography with Java Code
by - Univ. of Texas San Antonio
The author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible to many others.
(7536 views)
Book cover: Introduction to Modern CryptographyIntroduction to Modern Cryptography
by
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(10322 views)
Book cover: A Graduate Course in Applied CryptographyA Graduate Course in Applied Cryptography
by - cryptobook.us
This book is about constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal ...
(612 views)