Unicity distance
Results: 4
# | Item |
---|---|
1![]() | Communication Theory of Secrecy Systems? By C. E. S HANNON 1 I NTRODUCTION AND S UMMARYAdd to Reading ListSource URL: www.dsm.fordham.eduLanguage: English - Date: 2007-03-10 14:28:30 |
2![]() | Attacking Decipherment Problems Optimally with Low-Order N-gram Models Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292Add to Reading ListSource URL: www.aclweb.orgLanguage: English - Date: 2010-06-14 16:48:29 |
3![]() | Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security David A. McGrew and Scott R. Fluhrer mcgrew, sfluhrer @cisco.com Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134Add to Reading ListSource URL: www.mindspring.comLanguage: English - Date: 2002-11-21 18:03:36 |
4![]() | PDF DocumentAdd to Reading ListSource URL: netlab.cs.ucla.eduLanguage: English - Date: 2007-12-26 15:31:03 |