Probabilistic Methods for a Japanese Syllable Cipher (2009)

Cached

Download Links

by Sujith Ravi , Kevin Knight
Venue:In proceedings of the 22 nd International Conference on Computer Processing of Oriental Languages, Lecture Notes in Artificial Intelligence
Citations:2 - 1 self

Documents Related by Co-Citation

10 Attacking decipherment problems optimally with low-order n-gram models – Sujith Ravi, Kevin Knight - 2008
1 Cryptanalysis of Block Ciphers: A Survey. UCL Crypto group – Francois-Xavier Standaert, Gilles Piret, Jean-Jacques Quisquater - 2003
1 Classical Ciphers and Cryptanalysis – B Carter, T Magoc - 2007
1 Goester.: Solving Substitution Ciphers with Genetics Algorithm. A Technical Report submitted to university of Rochester, pp – Joe - 2003
1 Designing against a class of algebraic attacks on symmetric block ciphers – Carlisle Adams - 2006
1 Algebraic Cryptanalysis of Simplified AES – Sean Simmons - 2009
1 Selçuk.: On Probability of Success in Linear and Differential Cryptanalysis – Ali Aydın - 2008
1 Corona Chavez.: De-encryption of a text in spanish using probability and statistics – Bárbara E Sánchez Rinza, Diana Alejandra, Bigurra Zavala, Alonso - 2008
1 Hasinoff.: Solving Substitution Ciphers. A – W Samuel - 2003
1 Anish Nair, Nishit Rathod.: Unsupervised Analysis for Decipherment Problems – Kevin Knight - 2006
1 Bounds on Key Appearance Equivocation for Substitution Ciphers – Yuri Borissov, Moon Ho Lee - 2007
1 A Simplified Method for Computing the Key Equivocation for Additive-Like Instantaneous Block Encipherers – Zhaozhi Zhang
1 et al.: A Noval Security Model for Indic Scripts – A Case Study on Telugu – M S V S Bhadri Raju - 2009
2 DECRYPTING ENGLISH TEXT USING ENHANCED FREQUENCY ANALYSIS – K. W. Lee, C. E. Teh, Y. L. Tan
3 A Fast method for the Cryptanalysis of Substitution Ciphers – Thomas Jacobsen - 1995
3 Genetic Algorithm Cryptanalysis of a Fiestel Type – Ayman M B Albassal, Abdel-Moneim A Wahdan - 2004
15 The full cost of cryptanalytic attacks – Michael J. Wiener
6 Knight,'Attacking Letter Substitution Ciphers with – Sujith Ravi, Kevin
5978 A mathematical theory of communication – C E Shannon - 1948