To improve the physical-layer data confidentiality in short-reach optical networks, we have proposed an M-ary blockciphered system using an optical code multiplexing approach. In a previous system, each optical code (OC), that corresponds to a frequency subcarrier, was mapped onto one of the log2M bits, and the computational security is related to the correspondence between the bit-block and the OC, and the number of possible combinations equates M!. However, this system presents two critical issues (1) Computational Security: the number M of OCs that can be generated by an optical arrayed waveguide grating (AWG) is limited, due to the port number and the subcarrier crosstalk. (2) Physical security: a careful differential analysis of the co...
© 2013 IEEE.Spatial light modulation enhances capacity of optical communications by modulating spati...
In the 5G era, more sensitive information will be transmitted on optical networks. Although modern c...
Abstract Information encryption technique has broad applications in individual privacy, military con...
To improve the physical-layer data confidentiality in short-reach optical networks, we have proposed...
Abstract Optical layer attacks on optical fiber communication networks are one of the weakest reinfo...
All-optical data encryption is a promising technology that could lead communication systems to an un...
Abstract—A bandwidth- and power-efficient modulation scheme using M-ary differential phase-shift key...
© Asia Communications and Photonics Conference (ACP) OSA 2019 We report the experimental demonstrati...
Multi-channel information encryption technology has been implemented by optical metasurfaces owing t...
AbstractA scheme for all-optical encryption/decryption of QPSK signals based on ND-FWM in HNLF is pr...
A position-multiplexing technique with ultra-broadband illumination is proposed to enhance the infor...
A novel photonic security system is described using 2-D spatial codes based on both optical phase an...
As optical systems are diffraction limited, it is not possible to encrypt in a single step texts con...
We propose and demonstrate a new analog–digital combined high-secure optical communication system ba...
We analyze optical encryption systems using the techniques of conventional cryptography. All convent...
© 2013 IEEE.Spatial light modulation enhances capacity of optical communications by modulating spati...
In the 5G era, more sensitive information will be transmitted on optical networks. Although modern c...
Abstract Information encryption technique has broad applications in individual privacy, military con...
To improve the physical-layer data confidentiality in short-reach optical networks, we have proposed...
Abstract Optical layer attacks on optical fiber communication networks are one of the weakest reinfo...
All-optical data encryption is a promising technology that could lead communication systems to an un...
Abstract—A bandwidth- and power-efficient modulation scheme using M-ary differential phase-shift key...
© Asia Communications and Photonics Conference (ACP) OSA 2019 We report the experimental demonstrati...
Multi-channel information encryption technology has been implemented by optical metasurfaces owing t...
AbstractA scheme for all-optical encryption/decryption of QPSK signals based on ND-FWM in HNLF is pr...
A position-multiplexing technique with ultra-broadband illumination is proposed to enhance the infor...
A novel photonic security system is described using 2-D spatial codes based on both optical phase an...
As optical systems are diffraction limited, it is not possible to encrypt in a single step texts con...
We propose and demonstrate a new analog–digital combined high-secure optical communication system ba...
We analyze optical encryption systems using the techniques of conventional cryptography. All convent...
© 2013 IEEE.Spatial light modulation enhances capacity of optical communications by modulating spati...
In the 5G era, more sensitive information will be transmitted on optical networks. Although modern c...
Abstract Information encryption technique has broad applications in individual privacy, military con...