An extension of the Shannon theory approach to cryptography
From MaRDI portal
Publication:4137085
DOI10.1109/TIT.1977.1055709zbMath0362.94030WikidataQ27940968 ScholiaQ27940968MaRDI QIDQ4137085
Publication date: 1977
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Information theory (general) (94A15) Theory of error-correcting codes and error-detecting codes (94B99)
Related Items (11)
The unicity distance: An upper bound on the probability of an eavesdropper successfully estimating the secret key ⋮ Shannon's random-cipher result and the R-norm information ⋮ A generalization of Hellman's extension of Shannon's approach to cryptography ⋮ A new method to study genome mutations using the information entropy ⋮ The simulation of random processes on digital computers with Chebyshev mixing transformations ⋮ Searching secrets rationally ⋮ Comment on: ``Exposed-key weakness of \(\alpha \eta \) [Phys. Lett. A 370 (2007) 131] ⋮ Shannon's random-cipher result and the generalized \(R\)-norm entropy of type \(\beta\) ⋮ Properties of two Shannon's ciphers ⋮ Unnamed Item ⋮ Some Results on the Information Theoretic Analysis of Cryptosystems
This page was built for publication: An extension of the Shannon theory approach to cryptography