Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,031,209 papers from all fields of science
Search
Sign In
Create Free Account
Communication Theory of Secrecy Systems
Known as:
Shannon security
Communication Theory of Secrecy Systems is a paper published in 1949 by Claude Shannon discussing cryptography from the viewpoint of information…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
A Mathematical Theory of Communication
Block cipher
Confusion and diffusion
Cryptography
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
New Construction of Differentially 4-Uniform Bijections
C. Carlet
,
Deng Tang
,
Xiaohu Tang
,
Qunying Liao
Conference on Information Security and Cryptology
2013
Corpus ID: 15693609
Block ciphers use Substitution boxes (S-boxes) to create confusion into the cryptosystems. For resisting the known attacks on…
Expand
2013
2013
Visual evaluation, scaling and transport of secure videos
H. Hofbauer
2013
Corpus ID: 28898530
Due to the pervasive access to broad band internet at home and on mobile devices Video-onDemand (VoD) and video streaming become…
Expand
2010
2010
A new achievable rate-equivocation region for the relay-eavesdropper channel
Amir Sonee
,
Somayeh Salimi
,
M. Salmasizadeh
Iranian Conference on Electrical Engineering
2010
Corpus ID: 41317628
In this paper, we propose an information-theoretic scheme which achieves a new rate-equivocation region for the four-terminal…
Expand
2010
2010
Protocols for Reliable and Secure Message Transmission
Ashish Choudhury
IACR Cryptology ePrint Archive
2010
Corpus ID: 28502437
Consider the following problem: a sender S and a receiver R are part of an unreliable, connected, distributed network. The…
Expand
2007
2007
Preservation of epistemic properties in security protocol implementations
R. V. D. Meyden
,
T. Wilke
Theoretical Aspects of Rationality and Knowledge
2007
Corpus ID: 7197263
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic…
Expand
2005
2005
Information Transmission and Steganography
I. Cox
,
T. Kalker
,
Georg Pakura
,
M. Scheel
International Workshop on Digital Watermarking
2005
Corpus ID: 9554249
Recently there has been strong interest in developing models of steganography based on information theory. Previous work has…
Expand
2005
2005
Re-visiting the One-Time Pad
N. Nagaraj
,
Vivek Vaidya
,
P. Vaidya
International Journal of Network Security
2005
Corpus ID: 6137047
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system (One-Time Pad or OTP). It has generally been…
Expand
2001
2001
A new paradigm hidden in steganography
I. S. Moskowitz
,
Garth E. Longdon
,
LiWu Chang
New Security Paradigms Workshop
2001
Corpus ID: 9740745
Abstract : We discuss how steganography, in contrast to similar disciplines, requires a new paradigm based upon discontinuities…
Expand
1997
1997
Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes
Liam Keliher
1997
Corpus ID: 15895393
Substitution-permutation networks (SPNs) are an important class of private key cryptosystems, having substitution boxes (s-boxes…
Expand
Highly Cited
1989
Highly Cited
1989
One Way Hash Functions and DES
R. Merkle
Annual International Cryptology Conference
1989
Corpus ID: 206579020
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE