Login / Signup
An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext.
Nathan L. Gross
Willie K. Harrison
Published in:
ICC (2014)
Keyphrases
</>
error prone
ciphertext
encryption algorithm
standard model
labor intensive
public key
databases
high quality
image quality
encryption scheme