Attainable Unconditional Security for Shared-Key Cryptosystems
暂无分享,去创建一个
[1] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[2] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[3] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[4] Fazlollah M. Reza,et al. Introduction to Information Theory , 2004, Lecture Notes in Electrical Engineering.
[5] Dominic J. A. Welsh,et al. Codes and cryptography , 1988 .
[6] Axel Legay,et al. Attainable unconditional security for shared-key cryptosystems , 2016, Inf. Sci..
[7] Aiden A. Bruen,et al. Cryptography, information theory, and error-correction - a handbook for the 21st century , 2005, Wiley-Interscience series in discrete mathematics and optimization.
[8] Smile Markovski,et al. Quasigroup Representation of Some Feistel and Generalized Feistel Ciphers , 2012, ICT Innovations.
[9] Sos S. Agaian,et al. Design of image cipher using latin squares , 2014, Inf. Sci..
[10] Sos S. Agaian,et al. Dynamic and implicit latin square doubly stochastic S-boxes with reversibility , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] Mário S. Alvim,et al. Measuring Information Leakage Using Generalized Gain Functions , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[13] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[14] Alexander Russell,et al. How to fool an unbounded adversary with a short key , 2006, IEEE Trans. Inf. Theory.
[15] David A. Basin,et al. Automatically deriving information-theoretic bounds for adaptive side-channel attacks , 2011, J. Comput. Secur..
[16] Siu-Wai Ho,et al. Error-free perfect-secrecy systems , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.