Cryptographic transformations of non-Shannon sources of information
From MaRDI portal
Publication:466350
DOI10.1007/s10559-010-9263-5zbMath1316.94081OpenAlexW2029021368MaRDI QIDQ466350
Publication date: 27 October 2014
Published in: Cybernetics and Systems Analysis (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10559-010-9263-5
algorithmic information theory of Kolmogorovcomputational model of a cryptosystemcryptosystem modelcryptosystem resistancegeneral theory of optimal algorithmsideally resistant asymmetric cryptosystem
Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Analysis and design of stream ciphers
- Analysis of a simple factorization algorithm
- A fast method for complete randomization of messages.
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- The Diffie-Hellman protocol
- The tale of one-way functions
- Secure communications over insecure channels
- A Complete Public-Key Cryptosystem
- Relativized cryptography
- The Wire-Tap Channel