Have a personal or library account? Click to login
Quantum Distribution of a Sudoku Key Cover
By: Sian K. Jones  
Open Access
|Dec 2016

References

  1. [1] C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner.“Quantum cryptography, or unforgeable subway tokens”, in D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, 267-275, Springer US, 1983.10.1007/978-1-4757-0602-4_26
  2. [2] C. H. Bennett and G. Brassard.“Quantum cryptography: Public key distribution and coin tossing”, IEEE International Conference on Computers, Systems, and Signal Processing, p. 175, Bangalore, 1984.
  3. [3] C. Chang, Y. Chou, and T. D. Kieu.“An information hiding scheme using Sudoku”, ICICIC '08: Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, p. 17, Washington, DC, USA, 2008.10.1109/ICICIC.2008.149
  4. [4] S. Gupta.“Some results on Su Doku”. http://theory.tifr.res.in/~sgupta/sudoku/theorems.pdf (March 2006)
  5. [5] W. Hong, T. Chen, and C. Shiu.“Steganography using Sudoku revisited”, Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on Intelligent Information Technology Application (IITA'2008), 935-939, Shanghai, 2008.10.1109/IITA.2008.445
  6. [6] G. Royle.“Combinatorial concepts with Sudoku I: Symmetry”. http://people.csse.uwa.edu.au/gordon/sudoku/sudoku-symmetry.pdf (March 2006)
  7. [7] M. H. Shirali-Shahreza and M. Shirali-Shahreza.“Steganography in SMS by Sudoku puzzle”, 6th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2008), 844-847, Doha, Qatar, March 31 - April 4, 2008.10.1109/AICCSA.2008.4493626
  8. [8] S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, Doubleday, New York, USA, 1st edition, 1999.
  9. [9] J. Watrous.“Zero-knowledge against quantum attacks”, Proceedings of the 38th ACM Symposium on Theory of Computing, pages 296-305. ACM Press, New York, 2006.10.1145/1132516.1132560
  10. [10] H. Wien, C. Tung-Shou, and S. Chih-Wei.“A minimal euclidean distance searching technique for sudoku steganography”, ISISE '08. International Symposium on Information Science and Engieering, pages 515-518, 2008.
  11. [11] Y. Wu, J. Noonan, and S. Agaian. Binary data encryption using the sudoku block cipher, 3915 -3921, 2010. 10.1117/12.853197
Language: English
Page range: 87 - 94
Published on: Dec 8, 2016
Published by: Ludus Association
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2016 Sian K. Jones, published by Ludus Association
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.