Communication Theory of Secrecy Systems*

From MaRDI portal
Revision as of 06:03, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3645296

DOI10.1002/j.1538-7305.1949.tb00928.xzbMath1200.94005OpenAlexW2109394932WikidataQ1053345 ScholiaQ1053345MaRDI QIDQ3645296

No author found.

Publication date: 17 November 2009

Published in: Bell System Technical Journal (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x




Related Items (only showing first 100 items - show all)

Key variation technique based on piggybacking strategies under public key environmentsSPF-CA: A new cellular automata based block cipher using key-dependent S-boxesA novel image encryption algorithm based on chaotic billiardsOn differential uniformity of permutations derived using a generalized constructionGroup ring based public key cryptosystemsA DSA-like digital signature protocolEfficient Region of Interest Encryption Based on a New Chaotic MapQuantum cryptography and security analysisFundamental problems in provable security and cryptographySEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATORAnalysis of bitsum attack on block ciphersSYNCHRONIZATION OF CHUA CHAOTIC CIRCUITS WITH APPLICATION TO THE BIDIRECTIONAL SECURE COMMUNICATION SYSTEMSChaotic trigonometric Haar wavelet with focus on image encryptionConstruction of MDS matrices combining the Feistel, Misty and Lai-Massey schemesComputer cryptographic techniques for processing and storage of confidential information†A secure image cryptosystem via multiple chaotic mapsUnnamed ItemUnconditionally secure short key ciphers based on data compression and randomizationSimulation of QTRNG on IBM's Q experience using rotation and phase quantum gatesA semi-quantum private comparison with high-level security third partyIndifferentiability of the confusion-diffusion network and the cascade block cipherA further study on bridge structures and constructing bijective S-boxes for low-latency maskingA note on semi-orthogonal (G-matrix) and semi-involutory MDS matricesDecidable characterizations of dynamical properties for additive cellular automata over a finite abelian group with applications to data encryptionEnhanced design and hardware implementation of a chaos-based block cipher for image protectionQuantum Key‐Distribution Protocols Based on a Quantum Version of the Monty Hall GamePrivate disclosure with multiple agentsTwo intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvementAn uncertainty measure based on Pearson correlation as well as a multiscale generalized Shannon-based entropy with financial market applicationsHomomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulationImpossibility of indifferentiable iterated blockciphers from 3 or less primitive callsRandomized half-ideal cipher on groups with applications to UC (a)PAKEA cryptographic and coding-theoretic perspective on the global rules of cellular automataEntanglement and Entropic Uncertainty of Two Two‐Level AtomsRandomized machine learning algorithms to forecast the evolution of thermokarst lakes area in permafrost zonesConstruction of recursive MDS matrices using DLS matricesThe physical foundation of quantum theoryDistortion-based state security codes for distributed sensor networksRole of Steering Inequality in Quantum Key Distribution ProtocolПротоколы дистанционного голосования. I;Remote voting protocols. IA New Design of Substitution Box with Ideal Strict Avalanche CriterionHeuristic search of (semi-)bent functions based on cellular automataPAC privacy: automatic privacy measurement and control of data processingSequential indifferentiability of confusion-diffusion networksA quantum dialogue reduced by half unitary operationsLifting standard model reductions to common setup assumptionsPhysical layer security over Tsallis statistics for wireless communications with hardware impairments in the presence of some eavesdroppersPractical demonstration of quantum key distribution protocol with error correction mechanismCan language models automate data wrangling?A novel stream encryption scheme with avalanche effectAn orderly quantum multi-signature based on orthogonal product states for the multi-party transaction blockchainDiscussion on the initial states of controlled bidirectional quantum secure direct communicationA comprehensive review of quantum random number generators: concepts, classification and the origin of randomnessEfficient fault-tolerant quantum dialogue protocols based on dictionary encoding without decoy photonsFurther insights on constructing quantum circuits for Camellia block cipherSemi-quantum designated verifier signature schemeConstruction of nonlinear component based on bent Boolean functionsOn elliptic curve $L$-functions integrated encryption schemeUnnamed ItemCryptography and cryptographic protocolsLoss-tolerant measurement-device-independent quantum random number generationA new spatiotemporally chaotic cryptosystem and its security and performance analysesPublic-key encryption with chaosCryptanalysis of a Chaotic Block Cryptographic System Against Template AttacksSOME METHODS FOR CONSTRUCTING MDS-MATRICES OVER FINITE FIELDАтака на ГОСТ с уменьшенным числом итераций методом согласованияEfficient Image Encryption Scheme Based on 4-Dimensional Chaotic MapsQUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATIONA SELECTIVE IMAGE ENCRYPTION BASED ON COUPLE SPATIAL CHAOTIC SYSTEMSObituary: Claude Elwood Shannon 1916-2001THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENTChasing Diagrams in CryptographySome results onq-ary bent functionsUse of chaotic dynamical systems in cryptographyXor-Implications and E-Implications: Classes of Fuzzy Implications Based on Fuzzy XorPermutation polynomials modulo \(2^w\)Logistic map as a block encryption algorithmUnnamed ItemThe communication complexity of private simultaneous messages, revisitedAlgebraic Cryptanalysis of the Data Encryption StandardRandomness and Representation of Span n SequencesBiunitary constructions in quantum informationThe Tiny Encryption AlgorithmUnnamed ItemDispelling myths on superposition attacks: formal security model and attack analysesSecure Communication Systems Based on the Synchronization of Chaotic SystemsSTEPS TOWARDS CRYPTANALYSIS OF CHAOTIC ACTIVE/PASSIVE DECOMPOSITION ENCRYPTION SCHEMES USING AVERAGE DYNAMICS ESTIMATIONON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPSRandomness measures related to subset occurrenceUnnamed Item3D: A Three-Dimensional Block CipherA Plaintext-Related Image Encryption Algorithm Based on Compressive Sensing and a Novel Hyperchaotic SystemDecoy-state quantum key distribution with a leaky sourceCharacterization for entropy of shifts of finite type on Cayley treesHeuristic algorithm for obtaining permutations with given cryptographic properties using a generalized constructionOptimal potentials for diffusive search strategiesQuantum Authentication with Key RecyclingA new synchronisation method of fractional-order chaotic systems with distinct orders and dimensions and its application in secure communicationVariation and security enhancement of block ciphers by embeddingQuantum authencryption with two-photon entangled states for off-line communicants




This page was built for publication: Communication Theory of Secrecy Systems*