Rate-distortion theory for the Shannon cipher system
暂无分享,去创建一个
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] R. Ahlswede. Remarks on Shannon's secrecy systems , 1982 .
[3] Martin E. Hellman,et al. An extension of the Shannon theory approach to cryptography , 1977, IEEE Trans. Inf. Theory.
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] Rudolf Ahlswede,et al. Bad codes are good ciphers , 1982 .
[6] Hirosuke Yamamoto. Coding theorems for Shannon's cipher system with correlated source outputs, and common information , 1994, IEEE Trans. Inf. Theory.
[7] Hirosuke Yamamoto. A rate-distortion problem for a communication system with a secondary decoder to be hindered , 1988, IEEE Trans. Inf. Theory.
[8] Hirosuke Yamamoto. Coding theorem for secret sharing communication systems with two noisy channels , 1989, IEEE Trans. Inf. Theory.
[9] Rolf J. Blom. Sounds on key equivocation for simple substitution ciphers , 1979, IEEE Trans. Inf. Theory.
[10] Shyue-Ching Lu,et al. Addition to 'The Existence of Good Cryptosystems for Key Rates Greater Than the Message Redundancy' , 1980, IEEE Trans. Inf. Theory.
[11] James George Dunham. Bounds on message equivocation for simple substitution ciphers , 1980, IEEE Trans. Inf. Theory.
[12] Hirosuke Yamamoto,et al. A coding theorem for secret sharing communication systems with two Gaussian wiretap channels , 1991, IEEE Trans. Inf. Theory.
[13] Shyue-Ching Lu. Random ciphering bounds on a class of secrecy systems and discrete message sources , 1979, IEEE Trans. Inf. Theory.
[14] Rolf J. Blom. An Upper Bound on the Key Equivocation for Pure Ciphers , 1984, IEEE Trans. Inf. Theory.
[15] Hirosuke Yamamoto,et al. A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers , 1983, IEEE Trans. Inf. Theory.
[16] M. van Dijk. Broadcast channels with confidential messages, with tampering : the binary symmetric case , 1994 .
[17] Hirosuke Yamamoto,et al. Information theory in cryptology , 1991 .
[18] Andrea Sgarro. Error probabilities for simple substitution ciphers , 1983, IEEE Trans. Inf. Theory.