Cryptanalysis of Lempel-Ziv Compressed and Encrypted Text: The Statistics of Compression
暂无分享,去创建一个
[1] Dar-Shyang Lee,et al. Substitution Deciphering Based on HMMs with Applications to Compressed Document Processing , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Willie K. Harrison,et al. An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext , 2014, 2014 IEEE International Conference on Communications (ICC).
[3] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[4] John Kelsey,et al. Compression and Information Leakage of Plaintext , 2002, FSE.
[5] Jan Laan,et al. Master System and Network Engineering University of Amsterdam Cryptanalysis of , and practical attacks against E-Safenet encryption , 2014 .
[6] Azriel Rosenfeld,et al. Breaking substitution ciphers using a relaxation algorithm , 1979, CACM.
[7] Andrea Sgarro. Error probabilities for simple substitution ciphers , 1983, IEEE Trans. Inf. Theory.
[8] Terry A. Welch,et al. A Technique for High-Performance Data Compression , 1984, Computer.
[9] Tadayoshi Kohno. Analysis of the WinZip encryption method , 2004, IACR Cryptol. ePrint Arch..
[10] Abraham Lempel,et al. A universal algorithm for sequential data compression , 1977, IEEE Trans. Inf. Theory.
[11] Abraham Lempel,et al. Compression of individual sequences via variable-rate coding , 1978, IEEE Trans. Inf. Theory.
[12] Edwin Olson,et al. Robust Dictionary Attack of Short Simple Substitution Ciphers , 2007, Cryptologia.
[13] Roberto Tamassia,et al. Secure Compression: Theory \& Practice , 2014, IACR Cryptol. ePrint Arch..