Login / Signup

An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext.

Nathan L. GrossWillie K. Harrison
Published in: ICC (2014)
Keyphrases
  • error prone
  • ciphertext
  • encryption algorithm
  • standard model
  • labor intensive
  • public key
  • databases
  • high quality
  • image quality
  • encryption scheme