Pages that link to "Item:Q4137085"
From MaRDI portal
The following pages link to An extension of the Shannon theory approach to cryptography (Q4137085):
Displayed 11 items.
- Comment on: ``Exposed-key weakness of \(\alpha \eta \)'' [Phys. Lett. A 370 (2007) 131] (Q646974) (← links)
- Searching secrets rationally (Q899474) (← links)
- Shannon's random-cipher result and the R-norm information (Q1106808) (← links)
- A generalization of Hellman's extension of Shannon's approach to cryptography (Q1112784) (← links)
- The simulation of random processes on digital computers with Chebyshev mixing transformations (Q1144352) (← links)
- The unicity distance: An upper bound on the probability of an eavesdropper successfully estimating the secret key (Q1350004) (← links)
- Properties of two Shannon's ciphers (Q1744012) (← links)
- Shannon's random-cipher result and the generalized \(R\)-norm entropy of type \(\beta\) (Q2448832) (← links)
- A new method to study genome mutations using the information entropy (Q2667694) (← links)
- (Q3755354) (← links)
- Some Results on the Information Theoretic Analysis of Cryptosystems (Q5019340) (← links)