메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1939-1943

Tandem coding and cryptography on wiretap channels: EXIT chart analysis

Author keywords

[No Author keywords available]

Indexed keywords

BRUTE-FORCE ATTACK; CIPHERTEXTS; CRYPTOGRAPHIC CODES; CRYPTOGRAPHIC SYSTEMS; ERROR PRONES; EXIT CHART ANALYSIS; EXIT-CHARTS; FAST CORRELATION ATTACKS; INFORMATION TRANSFERS; INFORMATION-THEORETIC SECURITY; KEYSTREAM GENERATORS; LINEAR FEEDBACK SHIFT REGISTERS; MUTUAL INFORMATIONS; NON-ITERATIVE; PHYSICAL LAYERS; PLAINTEXT; SEARCH TIME; WIRETAP CHANNEL;

EID: 70449485032     PISSN: 21578102     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2009.5205606     Document Type: Conference Paper
Times cited : (12)

References (15)
  • 3
    • 0026219389 scopus 로고
    • Generalized Hamming weights for linear codes
    • Sep
    • V. K. Wei. Generalized Hamming weights for linear codes. Information Theory, IEEE Transactions on, 37(5):1412-1418, Sep 1991.
    • (1991) Information Theory, IEEE Transactions on , vol.37 , Issue.5 , pp. 1412-1418
    • Wei, V.K.1
  • 6
    • 70449509760 scopus 로고    scopus 로고
    • Accepted at ICC 2009 and posted on arXiv.org
    • arXiv:0901.0275v1 [cs.IT, Jan
    • W. K. Harrison and S. W. McLaughlin. Physical-layer security: Combining error control coding and cryptography. Accepted at ICC 2009 and posted on arXiv.org, arXiv:0901.0275v1 [cs.IT], Jan 2009.
    • (2009)
    • Harrison, W.K.1    McLaughlin, S.W.2
  • 7
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1:159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 8
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • Jan
    • T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. Computers, IEEE Transactions on, C-34(1):81-85, Jan 1985.
    • (1985) Computers, IEEE Transactions on , vol.C-34 , Issue.1 , pp. 81-85
    • Siegenthaler, T.1
  • 9
    • 85030473541 scopus 로고
    • On a fast correlation attack on certain stream ciphers
    • V. V. Chepyzhov and B.J.M. Smeets. On a fast correlation attack on certain stream ciphers. In EUROCRYPT, pages 176-185, 1991.
    • (1991) EUROCRYPT , pp. 176-185
    • Chepyzhov, V.V.1    Smeets, B.J.M.2
  • 10
    • 0036672635 scopus 로고    scopus 로고
    • Theoretical analysis of a correlation attack based on convolutional codes
    • Aug
    • T. Johansson and F. Jonsson. Theoretical analysis of a correlation attack based on convolutional codes. Information Theory, IEEE Transactions on, 48(8):2173-2181, Aug 2002.
    • (2002) Information Theory, IEEE Transactions on , vol.48 , Issue.8 , pp. 2173-2181
    • Johansson, T.1    Jonsson, F.2
  • 13
    • 2442425417 scopus 로고    scopus 로고
    • Extrinsic information transfer functions: Model and erasure channel properties
    • Nov
    • A. Ashikhmin, G. Kramer, and S. ten Brink. Extrinsic information transfer functions: Model and erasure channel properties. Information Theory, IEEE Transactions on, 50(11):2657-2673, Nov. 2004.
    • (2004) Information Theory, IEEE Transactions on , vol.50 , Issue.11 , pp. 2657-2673
    • Ashikhmin, A.1    Kramer, G.2    ten Brink, S.3
  • 15
    • 84888076087 scopus 로고    scopus 로고
    • D. Welsh. Codes and Cryptography. Oxford University Press, Walton Street, Oxford OX26DP, 1988.
    • D. Welsh. Codes and Cryptography. Oxford University Press, Walton Street, Oxford OX26DP, 1988.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.