Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,035,255 papers from all fields of science
Search
Sign In
Create Free Account
Unicity distance
Known as:
Spurious
, Spurious key
, Unicity (disambiguation)
In cryptography, unicity distance is the length of an original ciphertext needed to break the cipher by reducing the number of possible spurious keys…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Binary logarithm
Brute-force attack
Burrows–Wheeler transform
Ciphertext
Expand
Broader (1)
Information theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Towards Matching User Mobility Traces in Large-Scale Datasets
Dániel Kondor
,
Behrooz Hashemian
,
Y. de Montjoye
,
C. Ratti
IEEE Transactions on Big Data
2017
Corpus ID: 3569076
The problem of unicity and reidentifiability of records in large-scale databases has been studied in different contexts and…
Expand
Highly Cited
2016
Highly Cited
2016
Evolution algebras of arbitrary dimension and their decompositions
Yolanda Cabrera Casado
,
Mercedes Siles Molina
,
M. V. Velasco
2016
Corpus ID: 119602679
Highly Cited
2009
Highly Cited
2009
On free topological groups
I. Ciobanu
2009
Corpus ID: 55722061
In the present article the existence and unicity of almost (U;V)-free group over given space, where U;V are classes of…
Expand
Highly Cited
2007
Highly Cited
2007
Unicity Distance of Robust Image Hashing
Yinian Mao
,
Min Wu
IEEE Transactions on Information Forensics and…
2007
Corpus ID: 676005
An image hash is a randomized compact representation of image content and finds applications in image authentication, image and…
Expand
Highly Cited
2007
Highly Cited
2007
Incomplete pairwise comparison and consistency optimization
M. Fedrizzi
,
S. Giove
European Journal of Operational Research
2007
Corpus ID: 16832839
1998
1998
Relativistic and Newtonian Core-Shell Models: Analytical and Numerical Results
W. M. Vieira
,
P. Letelier
1998
Corpus ID: 53487309
We make a detailed analysis of the exact relativistic core-shell models recently proposed to describe a black hole or neutron…
Expand
Highly Cited
1995
Highly Cited
1995
A Fast Method for the Cryptanalysis of Substitution Ciphers
Thomas P. Jakobsen
1995
Corpus ID: 6106676
,
1986
1986
Finite element solution of the fundamental equations of semiconductor devices
Miloš Zláal
1986
Corpus ID: 33884117
In part I of the paper (see Zlamal [13]) finite element solutions of the nonstationary semiconductor equations were constructed…
Expand
Highly Cited
1986
Highly Cited
1986
On the unicity of dempster rule of combination
D. Dubois
,
H. Prade
International Journal of Intelligent Systems
1986
Corpus ID: 389545
Dempster has proposed a rule for the combination of uncertain items of information issued from several sources. This note proves…
Expand
Highly Cited
1979
Highly Cited
1979
Geometric Properties of the Kernel, Nucleolus, and Related Solution Concepts
M. Maschler
,
B. Peleg
,
L. Shapley
Mathematics of Operations Research
1979
Corpus ID: 43666418
Two solution concepts for cooperative games in characteristic-function form, the kernel and the nucleolus, are studied in their…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE