Pub Date : 2021-07-14DOI: 10.1002/9781119582397.ch9
S. Ravi, Ali Saeb
In this note, we look at several denitions of entropy and some of their consequences in information theory. We also obtain the entropy and relative entropy for general error distribution which is used to model errors which are not normal.
{"title":"Information Theory and its Applications","authors":"S. Ravi, Ali Saeb","doi":"10.1002/9781119582397.ch9","DOIUrl":"https://doi.org/10.1002/9781119582397.ch9","url":null,"abstract":"In this note, we look at several denitions of entropy and some of their consequences in information theory. We also obtain the entropy and relative entropy for general error distribution which is used to model errors which are not normal.","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1002/9781119582397.ch23
{"title":"MDS Codes, Secret Sharing, and Invariant Theory","authors":"","doi":"10.1002/9781119582397.ch23","DOIUrl":"https://doi.org/10.1002/9781119582397.ch23","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1002/9781119582397.oth
{"title":"Cryptography, Information Theory and Error‐Correction","authors":"","doi":"10.1002/9781119582397.oth","DOIUrl":"https://doi.org/10.1002/9781119582397.oth","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1002/9781119582397.ch5
{"title":"Modes of Operation for AES and Symmetric Algorithms","authors":"","doi":"10.1002/9781119582397.ch5","DOIUrl":"https://doi.org/10.1002/9781119582397.ch5","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122531165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1002/9781119582397.app2
{"title":"Appendix B","authors":"","doi":"10.1002/9781119582397.app2","DOIUrl":"https://doi.org/10.1002/9781119582397.app2","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123452524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1002/9781119582397.ch19
{"title":"Finite Fields, Modular Arithmetic, Linear Algebra, and Number Theory","authors":"","doi":"10.1002/9781119582397.ch19","DOIUrl":"https://doi.org/10.1002/9781119582397.ch19","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1002/9781119582397.ch3
{"title":"RSA, Key Searches, TLS, and Encrypting Email","authors":"","doi":"10.1002/9781119582397.ch3","DOIUrl":"https://doi.org/10.1002/9781119582397.ch3","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116750629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1002/9781119582397.index
{"title":"Index","authors":"","doi":"10.1002/9781119582397.index","DOIUrl":"https://doi.org/10.1002/9781119582397.index","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131308544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1002/9781119582397.ch22
{"title":"Reed‐Solomon and MDS Codes, and the Main Linear Coding Theory Problem (LCTP)","authors":"","doi":"10.1002/9781119582397.ch22","DOIUrl":"https://doi.org/10.1002/9781119582397.ch22","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114723216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-14DOI: 10.1007/978-3-642-32166-5_1
J. G. Pardo
{"title":"Classical Ciphers and Their Cryptanalysis","authors":"J. G. Pardo","doi":"10.1007/978-3-642-32166-5_1","DOIUrl":"https://doi.org/10.1007/978-3-642-32166-5_1","url":null,"abstract":"","PeriodicalId":293402,"journal":{"name":"Cryptography, Information Theory, and Error‐Correction","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}