|
Volumn 1, Issue 3, 1989, Pages 129-131
|
A generalization of Hellman's extension to Shannon's approach to cryptography
a a |
Author keywords
Cryptography; Information theory; Key equivocation; Shannon theory; Spurious decipherments
|
Indexed keywords
DATA TRANSMISSION;
INFORMATION THEORY;
KEY EQUIVOCATION;
LOWER BOUNDS;
SECURE COMMUNICATIONS;
SHANNON THEORY;
SPURIOUS DECIPHERMENTS;
UPPER BOUNDS;
CRYPTOGRAPHY;
|
EID: 0024133011
PISSN: 09332790
EISSN: 14321378
Source Type: Journal
DOI: 10.1007/BF02252870 Document Type: Article |
Times cited : (12)
|
References (3)
|