Selecting Secure Passwords
暂无分享,去创建一个
[1] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[2] Antoon Bosselaers,et al. Even Faster Hashing on the Pentium , 1997 .
[3] Kellen Petersen August. Real Analysis , 2009 .
[4] Robert J. McEliece,et al. An inequality on entropy , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[5] Erdal Arikan. An inequality on guessing and its application to sequential decoding , 1996, IEEE Trans. Inf. Theory.
[6] J. Massey. Guessing and entropy , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[7] David Malone,et al. Guesswork and entropy , 2004, IEEE Transactions on Information Theory.
[8] Van de M. L. J. Vel. Theory of convex structures , 1993 .
[9] Christian Cachin,et al. Entropy measures and unconditional security in cryptography , 1997 .