Security using Shannon-Fano-Elias codes
暂无分享,去创建一个
[1] D. Huffman. A Method for the Construction of Minimum-Redundancy Codes , 1952 .
[2] Jörg Henkel,et al. Cypress: compression and encryption of data and code for embedded multimedia systems , 2004, IEEE Design & Test of Computers.
[3] Xiaoyu Ruan,et al. Cryptanalysis of Shannon-Fano-Elias codes , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[4] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[5] Ruedi Seiler,et al. Segmentation and compression of documents with JPEG2000 , 2003, IEEE Trans. Consumer Electron..
[6] Ronald L. Rivest,et al. On breaking a Huffman code , 1996, IEEE Trans. Inf. Theory.
[7] Xiaoyu Ruan,et al. Using Improved Shannon-Fano-Elias Codes for Data Encryption , 2006, 2006 IEEE International Symposium on Information Theory.
[8] Xiaoyu Ruan,et al. Reducing the Length of Shannon-Fano-Elias Codes and Shannon-Fano Codes , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[9] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[10] J. Gerard Wolff,et al. Computing as Information Compression by Multiple Alignment, Unification and Search , 2003, J. Univers. Comput. Sci..