共 12 条
- [1] Yang J., Gao L., Zhang Y., Improving Memory Encryption Performance in Secure Processors, IEEE Trans. Computers, 54, 5, pp. 630-640, (2005)
- [2] Johnson M., Ishwar P., Prabhakaran V.M., Schonberg D., Ramchandran K., On Compressing Encrypted Data, IEEE Trans. Signal Processing, 52, 10, pp. 2992-3006, (2004)
- [3] Klein S.T., Bookstein A., Deerwestern S., Storing Text Retrieval Systems on CD-ROM: Compression and Encryption Considerations, ACM Trans. Information Systems, 7, 3, pp. 230-245, (1989)
- [4] Lekatsas H., Henkel J., Chakradhar S., Jakkula V., Cypress: Compression and Encryption of Data and Code for Embedded Multimedia Systems, IEEE Design and Test of Computers, 21, 5, pp. 406-415, (2004)
- [5] Huffman D.A., A Method for the Construction of Minimum Redundency Codes, Proc. IRE, 40, pp. 1098-1101, (1952)
- [6] Robin F., Cryptographic Aspects of Data Compression Codes, Cryptologia, 3, 4, pp. 202-205, (1979)
- [7] Gillman D.W., Mohtashemi M., Rivest R.L., On Breaking a Huffman Code, IEEE Trans. Information Theory, 42, 3, pp. 972-976, (1996)
- [8] Lempel A., Ziv J., On the Complexity of Finite Sequences, IEEE Trans. Information Theory, 22, pp. 75-88, (1976)
- [9] Williems F.M.J., Shtarkov Y.M., Tjalkens T.J., The Context-Tree Weighting Method: Basic Properties, IEEE Trans. Information Theory, 41, 3, pp. 653-664, (1995)
- [10] Pasco R., Source Coding Algorithm for Fast Data Compression, (1976)