Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,058 papers from all fields of science
Search
Sign In
Create Free Account
Communication Theory of Secrecy Systems
Known as:
Shannon security
Communication Theory of Secrecy Systems is a paper published in 1949 by Claude Shannon discussing cryptography from the viewpoint of information…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
A Mathematical Theory of Communication
Block cipher
Confusion and diffusion
Cryptography
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Security Solution for the IOT Devices
Dr. Gorti Vnkv
,
Subbarao
2019
Corpus ID: 209080750
-As the internet is available widely with low cost to connect with the devices day by day. Almost all electronic devices are…
Expand
2019
2019
On Perfect Endomorphic Ciphers
N. Shenets
IACR Cryptology ePrint Archive
2019
Corpus ID: 174801004
It has been 70 years since the publication of the seminal outstanding work of Claude Elwood Shannon, in which he first gave a…
Expand
2017
2017
Key updating for leakage resiliency with application to Shannon security OTP and AES modes of operation
Pratiksha Vilas Mankar
International Conference on Informatics, IoT, and…
2017
Corpus ID: 261288063
Side channel analysis (SCA) represents frequently occurred and major type of attack against implementation of any cryptographic…
Expand
2013
2013
Visual evaluation, scaling and transport of secure videos
H. Hofbauer
2013
Corpus ID: 28898530
Due to the pervasive access to broad band internet at home and on mobile devices Video-onDemand (VoD) and video streaming become…
Expand
2013
2013
Quantum Secret Communication without an Encryption Key
Marius Nagy
,
Naya Nagy
International Conference on Theory and Practice…
2013
Corpus ID: 32057801
Quantum cryptographic methods increase security over classical methods. To date, quantum algorithms aim to distribute a secret…
Expand
2010
2010
A new achievable rate-equivocation region for the relay-eavesdropper channel
Amir Sonee
,
Somayeh Salimi
,
M. Salmasizadeh
Iranian Conference on Electrical Engineering
2010
Corpus ID: 41317628
In this paper, we propose an information-theoretic scheme which achieves a new rate-equivocation region for the four-terminal…
Expand
2010
2010
Protocols for Reliable and Secure Message Transmission
Ashish Choudhury
IACR Cryptology ePrint Archive
2010
Corpus ID: 28502437
Consider the following problem: a sender S and a receiver R are part of an unreliable, connected, distributed network. The…
Expand
2003
2003
Provable secure scalable block ciphers
Lenka Fibíková
2003
Corpus ID: 16677073
Beweisbare Sicherheit und Skalierbarkeit sind zwei wunschenswerte Eigenschaften einer Blockchiffre. Die erste garantiert, dass…
Expand
1999
1999
An Entropy-Based Framework for Database Inference
I. S. Moskowitz
,
LiWu Chang
Information Hiding
1999
Corpus ID: 27599616
In this paper, we discuss the database inference problem. We look at both query-based and partial view-based cases of the problem…
Expand
1997
1997
Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes
Liam Keliher
1997
Corpus ID: 15895393
Substitution-permutation networks (SPNs) are an important class of private key cryptosystems, having substitution boxes (s-boxes…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE