1 C. Rackoff, "“Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack,” in Advances in Cryptology: CRYPTO ’91" Springer Berlin 576 : 433-444, 1992
2 H. Tanaka, "“A realization scheme for the identity-based cryptosystem,” in Advances in Cryptology:CRYPTO ’87" Springer Berlin 293 : 340-349, 1988
3 J. W. Goodman, "Statistical Optics" Wiley 1985
4 B. Javidi, "Securing information by use of digital holography" 25 (25): 28-30, 2000
5 M. Singh, "Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption" 40 (40): 619-624, 2008
6 X. Tan, "Secure optical memory system with polarization encryption" 40 (40): 2310-2315, 2001
7 G. M. Morris, "Scene matching using photon-limited images" 1 (1): 482-488, 1984
8 A. J. Menezes, "Reducing elliptic curve logarithms to logarithms in a finite field" 39 (39): 1639-1646, 1993
9 T. Sarkadi, "Quantitative security evaluation of optical encryption using hybrid phaseand amplitude-modulated keys" 51 (51): 745-750, 2012
10 P. Koppa, "Phase-to-amplitude data page conversion for holographic storage and optical encryption" 46 (46): 3561-3571, 2007
1 C. Rackoff, "“Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack,” in Advances in Cryptology: CRYPTO ’91" Springer Berlin 576 : 433-444, 1992
2 H. Tanaka, "“A realization scheme for the identity-based cryptosystem,” in Advances in Cryptology:CRYPTO ’87" Springer Berlin 293 : 340-349, 1988
3 J. W. Goodman, "Statistical Optics" Wiley 1985
4 B. Javidi, "Securing information by use of digital holography" 25 (25): 28-30, 2000
5 M. Singh, "Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption" 40 (40): 619-624, 2008
6 X. Tan, "Secure optical memory system with polarization encryption" 40 (40): 2310-2315, 2001
7 G. M. Morris, "Scene matching using photon-limited images" 1 (1): 482-488, 1984
8 A. J. Menezes, "Reducing elliptic curve logarithms to logarithms in a finite field" 39 (39): 1639-1646, 1993
9 T. Sarkadi, "Quantitative security evaluation of optical encryption using hybrid phaseand amplitude-modulated keys" 51 (51): 745-750, 2012
10 P. Koppa, "Phase-to-amplitude data page conversion for holographic storage and optical encryption" 46 (46): 3561-3571, 2007
11 P. Refregier, "Optical-image encryption based on input plane and Fourier plane random encoding" 20 (20): 767-769, 1995
12 T. Nomura, "Optical encryption system with a binary key code" 39 (39): 4783-4787, 2000
13 B. Javidi, "Nonlinear matched filter based optical correlation" 28 (28): 4518-4520, 1989
14 M. Pätzold, "Mobile Fading Channels" Wiley & Sons 2002
15 D. S. Monaghan, "Key-space analysis of double random phase encryption technique" 46 (46): 6641-6647, 2007
16 E. Pérez-Cabré, "Information authentication using photon-counting doublerandom-phase encrypted images" 36 (36): 22-24, 2011
17 E. A. Watson, "Imaging thermal objects with photon-counting detector" 31 (31): 4751-4757, 1992
18 Z. Liu, "Image encryption scheme by using iterative random phase encoding in gyrator transform domains" 49 (49): 542-546, 2011
19 Z. Liu, "Image encryption based on the random rotation operation in the fractional Fourier transform domains" 50 (50): 1352-1358, 2012
20 Z. Liu, "Image encryption algorithm based on the random local phase encoding in gyrator transform domains" 285 (285): 3921-3925, 2012
21 M. Joshi, "Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys" 283 (283): 2496-2505, 2010
22 O. Matoba, "Encrypted optical storage with angular multiplexing" 38 (38): 7288-7293, 1999
23 F. Xiong, "Digital Modulation Techniques" Artech House 2000
24 J. G. Proakis, "Digital Communications" McGraw-Hill 2008
25 S. Tsujii, "An ID-based cryptosystem based on the discrete logarithm problem" 7 (7): 467-473, 1989
26 T. Ujvári, "A secure data storage system based on phase-encoded thin polarization holograms" 6 (6): 401-411, 2004