An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext
暂无分享,去创建一个
[1] Azriel Rosenfeld,et al. Breaking substitution ciphers using a relaxation algorithm , 1979, CACM.
[2] T. Moon,et al. Mathematical Methods and Algorithms for Signal Processing , 1999 .
[3] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[4] George W. Hart. To decode short cryptograms , 1994, CACM.
[5] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[6] James George Dunham. Bounds on message equivocation for simple substitution ciphers , 1980, IEEE Trans. Inf. Theory.
[7] Thomas P. Jakobsen,et al. A Fast Method for the Cryptanalysis of Substitution Ciphers , 1995 .
[8] Rolf J. Blom. Sounds on key equivocation for simple substitution ciphers , 1979, IEEE Trans. Inf. Theory.
[9] Dar-Shyang Lee,et al. Substitution Deciphering Based on HMMs with Applications to Compressed Document Processing , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[10] Steven W. McLaughlin,et al. Equivocations for the simple substitution cipher with erasure-prone ciphertext , 2012, 2012 IEEE Information Theory Workshop.
[11] Kevin Knight,et al. Unsupervised Analysis for Decipherment Problems , 2006, ACL.
[12] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[13] Andrea Sgarro. Error probabilities for simple substitution ciphers , 1983, IEEE Trans. Inf. Theory.
[14] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[15] Edwin Olson,et al. Robust Dictionary Attack of Short Simple Substitution Ciphers , 2007, Cryptologia.