Communication Theory of Secrecy Systems*
From MaRDI portal
Publication:3645296
DOI10.1002/j.1538-7305.1949.tb00928.xzbMath1200.94005OpenAlexW2109394932WikidataQ1053345 ScholiaQ1053345MaRDI QIDQ3645296
No author found.
Publication date: 17 November 2009
Published in: Bell System Technical Journal (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Communication theory (94A05)
Related Items (only showing first 100 items - show all)
Key variation technique based on piggybacking strategies under public key environments ⋮ SPF-CA: A new cellular automata based block cipher using key-dependent S-boxes ⋮ A novel image encryption algorithm based on chaotic billiards ⋮ On differential uniformity of permutations derived using a generalized construction ⋮ Group ring based public key cryptosystems ⋮ A DSA-like digital signature protocol ⋮ Efficient Region of Interest Encryption Based on a New Chaotic Map ⋮ Quantum cryptography and security analysis ⋮ Fundamental problems in provable security and cryptography ⋮ SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR ⋮ Analysis of bitsum attack on block ciphers ⋮ SYNCHRONIZATION OF CHUA CHAOTIC CIRCUITS WITH APPLICATION TO THE BIDIRECTIONAL SECURE COMMUNICATION SYSTEMS ⋮ Chaotic trigonometric Haar wavelet with focus on image encryption ⋮ Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes ⋮ Computer cryptographic techniques for processing and storage of confidential information† ⋮ A secure image cryptosystem via multiple chaotic maps ⋮ Unnamed Item ⋮ Unconditionally secure short key ciphers based on data compression and randomization ⋮ Simulation of QTRNG on IBM's Q experience using rotation and phase quantum gates ⋮ A semi-quantum private comparison with high-level security third party ⋮ Indifferentiability of the confusion-diffusion network and the cascade block cipher ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ A note on semi-orthogonal (G-matrix) and semi-involutory MDS matrices ⋮ Decidable characterizations of dynamical properties for additive cellular automata over a finite abelian group with applications to data encryption ⋮ Enhanced design and hardware implementation of a chaos-based block cipher for image protection ⋮ Quantum Key‐Distribution Protocols Based on a Quantum Version of the Monty Hall Game ⋮ Private disclosure with multiple agents ⋮ Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement ⋮ An uncertainty measure based on Pearson correlation as well as a multiscale generalized Shannon-based entropy with financial market applications ⋮ Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation ⋮ Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls ⋮ Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ A cryptographic and coding-theoretic perspective on the global rules of cellular automata ⋮ Entanglement and Entropic Uncertainty of Two Two‐Level Atoms ⋮ Randomized machine learning algorithms to forecast the evolution of thermokarst lakes area in permafrost zones ⋮ Construction of recursive MDS matrices using DLS matrices ⋮ The physical foundation of quantum theory ⋮ Distortion-based state security codes for distributed sensor networks ⋮ Role of Steering Inequality in Quantum Key Distribution Protocol ⋮ Протоколы дистанционного голосования. I;Remote voting protocols. I ⋮ A New Design of Substitution Box with Ideal Strict Avalanche Criterion ⋮ Heuristic search of (semi-)bent functions based on cellular automata ⋮ PAC privacy: automatic privacy measurement and control of data processing ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ A quantum dialogue reduced by half unitary operations ⋮ Lifting standard model reductions to common setup assumptions ⋮ Physical layer security over Tsallis statistics for wireless communications with hardware impairments in the presence of some eavesdroppers ⋮ Practical demonstration of quantum key distribution protocol with error correction mechanism ⋮ Can language models automate data wrangling? ⋮ A novel stream encryption scheme with avalanche effect ⋮ An orderly quantum multi-signature based on orthogonal product states for the multi-party transaction blockchain ⋮ Discussion on the initial states of controlled bidirectional quantum secure direct communication ⋮ A comprehensive review of quantum random number generators: concepts, classification and the origin of randomness ⋮ Efficient fault-tolerant quantum dialogue protocols based on dictionary encoding without decoy photons ⋮ Further insights on constructing quantum circuits for Camellia block cipher ⋮ Semi-quantum designated verifier signature scheme ⋮ Construction of nonlinear component based on bent Boolean functions ⋮ On elliptic curve $L$-functions integrated encryption scheme ⋮ Unnamed Item ⋮ Cryptography and cryptographic protocols ⋮ Loss-tolerant measurement-device-independent quantum random number generation ⋮ A new spatiotemporally chaotic cryptosystem and its security and performance analyses ⋮ Public-key encryption with chaos ⋮ Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks ⋮ SOME METHODS FOR CONSTRUCTING MDS-MATRICES OVER FINITE FIELD ⋮ Атака на ГОСТ с уменьшенным числом итераций методом согласования ⋮ Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic Maps ⋮ QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION ⋮ A SELECTIVE IMAGE ENCRYPTION BASED ON COUPLE SPATIAL CHAOTIC SYSTEMS ⋮ Obituary: Claude Elwood Shannon 1916-2001 ⋮ THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT ⋮ Chasing Diagrams in Cryptography ⋮ Some results onq-ary bent functions ⋮ Use of chaotic dynamical systems in cryptography ⋮ Xor-Implications and E-Implications: Classes of Fuzzy Implications Based on Fuzzy Xor ⋮ Permutation polynomials modulo \(2^w\) ⋮ Logistic map as a block encryption algorithm ⋮ Unnamed Item ⋮ The communication complexity of private simultaneous messages, revisited ⋮ Algebraic Cryptanalysis of the Data Encryption Standard ⋮ Randomness and Representation of Span n Sequences ⋮ Biunitary constructions in quantum information ⋮ The Tiny Encryption Algorithm ⋮ Unnamed Item ⋮ Dispelling myths on superposition attacks: formal security model and attack analyses ⋮ Secure Communication Systems Based on the Synchronization of Chaotic Systems ⋮ STEPS TOWARDS CRYPTANALYSIS OF CHAOTIC ACTIVE/PASSIVE DECOMPOSITION ENCRYPTION SCHEMES USING AVERAGE DYNAMICS ESTIMATION ⋮ ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS ⋮ Randomness measures related to subset occurrence ⋮ Unnamed Item ⋮ 3D: A Three-Dimensional Block Cipher ⋮ A Plaintext-Related Image Encryption Algorithm Based on Compressive Sensing and a Novel Hyperchaotic System ⋮ Decoy-state quantum key distribution with a leaky source ⋮ Characterization for entropy of shifts of finite type on Cayley trees ⋮ Heuristic algorithm for obtaining permutations with given cryptographic properties using a generalized construction ⋮ Optimal potentials for diffusive search strategies ⋮ Quantum Authentication with Key Recycling ⋮ A new synchronisation method of fractional-order chaotic systems with distinct orders and dimensions and its application in secure communication ⋮ Variation and security enhancement of block ciphers by embedding ⋮ Quantum authencryption with two-photon entangled states for off-line communicants
This page was built for publication: Communication Theory of Secrecy Systems*