An extension of the Shannon theory approach to cryptography
From MaRDI portal
Publication:4137085
Cited in
(11)- Shannon's random-cipher result and the R-norm information
- Shannon's random-cipher result and the generalized \(R\)-norm entropy of type \(\beta\)
- A generalization of Hellman's extension of Shannon's approach to cryptography
- Properties of two Shannon's ciphers
- Some results on the information theoretic analysis of cryptosystems
- Searching secrets rationally
- A new method to study genome mutations using the information entropy
- The simulation of random processes on digital computers with Chebyshev mixing transformations
- Comment on: ``Exposed-key weakness of \(\alpha \eta \) [Phys. Lett. A 370 (2007) 131]
- The unicity distance: An upper bound on the probability of an eavesdropper successfully estimating the secret key
- scientific article; zbMATH DE number 4004063 (Why is no real title available?)
This page was built for publication: An extension of the Shannon theory approach to cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4137085)