Charakterisierung redundanzfreier codes zur datenverschlüsselung
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications (1984)
- Volume: 18, Issue: 2, page 131-146
- ISSN: 0988-3754
Access Full Article
topHow to cite
topJürgensen, H., and Kunze, M.. "Charakterisierung redundanzfreier codes zur datenverschlüsselung." RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications 18.2 (1984): 131-146. <http://eudml.org/doc/92202>.
@article{Jürgensen1984,
author = {Jürgensen, H., Kunze, M.},
journal = {RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications},
keywords = {discrete information source; data protection; redundancy-free code; arithmetic mapping; cryptography; crypto-code},
language = {ger},
number = {2},
pages = {131-146},
publisher = {EDP-Sciences},
title = {Charakterisierung redundanzfreier codes zur datenverschlüsselung},
url = {http://eudml.org/doc/92202},
volume = {18},
year = {1984},
}
TY - JOUR
AU - Jürgensen, H.
AU - Kunze, M.
TI - Charakterisierung redundanzfreier codes zur datenverschlüsselung
JO - RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
PY - 1984
PB - EDP-Sciences
VL - 18
IS - 2
SP - 131
EP - 146
LA - ger
KW - discrete information source; data protection; redundancy-free code; arithmetic mapping; cryptography; crypto-code
UR - http://eudml.org/doc/92202
ER -
References
top- 1. P. ANDELMAN, und J. REEDS, On the Cryptanalysis of Rotor Machines and Substitution-Permutation Networks, I.E.E.E. Trans. Information Theory IT-28, 1982, p. 578-584. Zbl0484.94026
- 2. R. ASH, Information Theory, John Wiley & Sons, New York, 1965. Zbl0141.34904MR229475
- 3. J. DUSKE und H. JÜRGENSEN, Codierungstheorie, Bi-Wissenschaftsverlag, Mannheim, 1977. Zbl0403.94011MR529774
- 4. P. ELIAS, (Unveröffentlicht, vgl. [6]).
- 5. S. GUIASU, Information Theory with Applications, McGraw-Hül Book Co., New York, 1977. Zbl0379.94027MR504352
- 6. F. JELINEK, Probabilistic Information Theory, McGraw-Hill Book Co., New York, 1968. Zbl0174.50702
- 7. F. JELINEK und G. LONGO, Algorithms for Source Coding ; in : G. LONGO (Hrsg.), Coding and Complexity, C.I.S.M. Courses and Lectures 216, Springer-Verlag, Wien, New York, 1975, p. 293-330. Zbl0357.94021
- 8. H. JÜRGENSEN und M. KUNZE, Über die Implementierung redundanzfreier Codes zur Datenverschlüsselung, Erscheint in R.A.I.R.O. Zbl0608.94010
- 9. H. JÜRGENSEN und D. MATTHEWS, The Information Theoretic Analysis of Cryptosystems, Erscheint im Tagungsband von Crypto '83, Santa Barbara, 1983.
- 10. R. C. PASCO, Source Coding Algorithms for Fast Data Compression, Ph. D. Thesis, Stanford University, CA, 1976.
- 11. F. RUBIN, Cryptographic Aspects of Data Compression Codes, Cryptologia 3, 1979, p. 202-205. Zbl0416.94014
- 12. F. RUBIN, Arithmetic Stream Coding Using Fixed Precision Registers, I.E.E.E. Trans. Information Theory IT-25, 1979, p. 672-675. Zbl0422.94029MR551265
- 13. N. RYSKA und S. HERDA, Kryptographische Verfahren in der Datenverarbeitung, Informatik Fachbereichte 24, Springer-Verlag, Berlin, Heidelberg, New York, 1980. Zbl0426.68107
- 14. C. E. SHANNON, Communication Theory of Secrecy Systems, Bell Syst. Techn. J. 28, 1949, p. 656-715. Zbl1200.94005MR32133
Citations in EuDML Documents
topNotesEmbed ?
topTo embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.