-
1
-
-
33747497952
-
Information theory in cryptology
-
Sept.
-
H. Yamamoto, "Information theory in cryptology," IEICE Trans., vol. E74, no. 9, pp. 2456-2468, Sept. 1991.
-
(1991)
IEICE Trans.
, vol.E74
, Issue.9
, pp. 2456-2468
-
-
Yamamoto, H.1
-
2
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 565-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 565-715
-
-
Shannon, C.E.1
-
3
-
-
0017495002
-
An extension of the Shannon theory approach to cryptography
-
M. E. Hellman, "An extension of the Shannon theory approach to cryptography," IEEE Trans. Inform. Theory, vol. IT-23, no. 3, pp. 289-294, 1977.
-
(1977)
IEEE Trans. Inform. Theory
, vol.IT-23
, Issue.3
, pp. 289-294
-
-
Hellman, M.E.1
-
4
-
-
0018305541
-
Bounds on key equivocation for simple substitution ciphers
-
R. J. Blom, "Bounds on key equivocation for simple substitution ciphers," IEEE Trans. Inform. Theory, vol. IT-25, no. 1, pp. 8-18, 1979.
-
(1979)
IEEE Trans. Inform. Theory
, vol.IT-25
, Issue.1
, pp. 8-18
-
-
Blom, R.J.1
-
5
-
-
0018491845
-
Random ciphering bounds on a class of secrecy systems and discrete message sources
-
S. C. Lu, "Random ciphering bounds on a class of secrecy systems and discrete message sources," IEEE Trans. Inform. Theory, vol. IT-25, no. 4, pp. 405-414, 1979.
-
(1979)
IEEE Trans. Inform. Theory
, vol.IT-25
, Issue.4
, pp. 405-414
-
-
Lu, S.C.1
-
6
-
-
0018491846
-
The existence of good cryptosystems for key rates greater than the message redundancy
-
_, "The existence of good cryptosystems for key rates greater than the message redundancy," IEEE Trans. Inform. Theory, vol. IT-25, no. 4, pp. 475-477, 1979.
-
(1979)
IEEE Trans. Inform. Theory
, vol.IT-25
, Issue.4
, pp. 475-477
-
-
-
7
-
-
0019058426
-
Bounds on message equivocation for simple substitution ciphers
-
J. G. Dunham, "Bounds on message equivocation for simple substitution ciphers," IEEE Trans. Inform. Theory, vol. IT-26, no. 5, pp. 522-527, 1980.
-
(1980)
IEEE Trans. Inform. Theory
, vol.IT-26
, Issue.5
, pp. 522-527
-
-
Dunham, J.G.1
-
8
-
-
0020289167
-
Remarks on Shannon's secrecy systems
-
R. Ahlswede, "Remarks on Shannon's secrecy systems," Probl. Contr. Inform. Theory, vol. 11, no. 4, pp. 301-318, 1982.
-
(1982)
Probl. Contr. Inform. Theory
, vol.11
, Issue.4
, pp. 301-318
-
-
Ahlswede, R.1
-
9
-
-
0020278972
-
Bad codes are good ciphers
-
R. Ahlswede and G. Dueck, "Bad codes are good ciphers," Probl. Contr. Inform. Theory, vol. 11, no. 5, pp. 337-351, 1982.
-
(1982)
Probl. Contr. Inform. Theory
, vol.11
, Issue.5
, pp. 337-351
-
-
Ahlswede, R.1
Dueck, G.2
-
10
-
-
0020716877
-
Error probabilities for simple substitution ciphers
-
A. Sgarro, "Error probabilities for simple substitution ciphers," IEEE Trans. Inform. Theory, vol. IT-29, no. 2, pp. 190-198, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, Issue.2
, pp. 190-198
-
-
Sgarro, A.1
-
11
-
-
0021166536
-
An upper bound on the key equivocation for pure cipher
-
R. J. Blom, "An upper bound on the key equivocation for pure cipher," IEEE Trans. Inform. Theory, vol. IT-30, no. 1, pp. 82-84, 1984.
-
(1984)
IEEE Trans. Inform. Theory
, vol.IT-30
, Issue.1
, pp. 82-84
-
-
Blom, R.J.1
-
12
-
-
0028346503
-
Coding theorems for Shannon's cipher system with correlated source outputs, and common information
-
H. Yamamoto, "Coding theorems for Shannon's cipher system with correlated source outputs, and common information," IEEE Trans. Inform. Theory, vol. 40, no. 1, pp. 85-95, 1994.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, Issue.1
, pp. 85-95
-
-
Yamamoto, H.1
-
13
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. IT-24, no. 3, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
14
-
-
0017996501
-
The Gaussian wiretap channels
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channels," IEEE Trans. Inform. Theory, vol. IT-24, no. 4, pp. 451-456, 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
15
-
-
0020843592
-
A source coding problem for sources with additional outputs to keep secret from the receiver or wiretapper
-
H. Yamamoto, "A source coding problem for sources with additional outputs to keep secret from the receiver or wiretapper," IEEE Trans. Inform. Theory, vol. IT-29, no. 6, pp. 918-923, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, Issue.6
, pp. 918-923
-
-
Yamamoto, H.1
-
16
-
-
0024035415
-
A rate-distortion problem for a communication system with a secondary decoder to be hindered
-
_, "A rate-distortion problem for a communication system with a secondary decoder to be hindered," IEEE Trans. Inform. Theory, vol. 34, no. 4, pp. 835-842, 1988.
-
(1988)
IEEE Trans. Inform. Theory
, vol.34
, Issue.4
, pp. 835-842
-
-
-
17
-
-
0024666944
-
Coding theorem for secret sharing communication systems with two noisy channels
-
_, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Trans. Inform. Theory, vol. 35, no. 3, pp. 572-578, 1989.
-
(1989)
IEEE Trans. Inform. Theory
, vol.35
, Issue.3
, pp. 572-578
-
-
-
18
-
-
0026153306
-
A coding theorem for secret sharing communication systems with two Gaussian channels
-
_, "A coding theorem for secret sharing communication systems with two Gaussian channels," IEEE Trans. Inform. Theory, vol. 37, no. 3, pp. 634-638, 1991.
-
(1991)
IEEE Trans. Inform. Theory
, vol.37
, Issue.3
, pp. 634-638
-
-
|