{"title":"Information Theory and its Applications","authors":"S. Ravi, Ali Saeb","doi":"10.1002/9781119582397.ch9","DOIUrl":"https://doi.org/10.1002/9781119582397.ch9","url":null,"abstract":"In this note, we look at several denitions of entropy and some of their consequences in information theory. We also obtain the entropy and relative entropy for general error distribution which is used to model errors which are not normal.","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MDS Codes, Secret Sharing, and Invariant Theory","authors":"","doi":"10.1002/9781119582397.ch23","DOIUrl":"https://doi.org/10.1002/9781119582397.ch23","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptography, Information Theory and Error‐Correction","authors":"","doi":"10.1002/9781119582397.oth","DOIUrl":"https://doi.org/10.1002/9781119582397.oth","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modes of Operation for AES and Symmetric Algorithms","authors":"","doi":"10.1002/9781119582397.ch5","DOIUrl":"https://doi.org/10.1002/9781119582397.ch5","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122531165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Appendix B","authors":"","doi":"10.1002/9781119582397.app2","DOIUrl":"https://doi.org/10.1002/9781119582397.app2","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123452524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finite Fields, Modular Arithmetic, Linear Algebra, and Number Theory","authors":"","doi":"10.1002/9781119582397.ch19","DOIUrl":"https://doi.org/10.1002/9781119582397.ch19","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RSA, Key Searches, TLS, and Encrypting Email","authors":"","doi":"10.1002/9781119582397.ch3","DOIUrl":"https://doi.org/10.1002/9781119582397.ch3","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116750629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Index","authors":"","doi":"10.1002/9781119582397.index","DOIUrl":"https://doi.org/10.1002/9781119582397.index","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131308544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reed‐Solomon and MDS Codes, and the Main Linear Coding Theory Problem (LCTP)","authors":"","doi":"10.1002/9781119582397.ch22","DOIUrl":"https://doi.org/10.1002/9781119582397.ch22","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114723216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classical Ciphers and Their Cryptanalysis","authors":"J. G. Pardo","doi":"10.1007/978-3-642-32166-5_1","DOIUrl":"https://doi.org/10.1007/978-3-642-32166-5_1","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}