共 26 条
[1]
Basharin G. P., 1959, Theory of Probability & Its Applications, V4, P333, DOI [10.1137/1104033, DOI 10.1137/1104033]
[2]
Capo E.J.M., P 2016 INT C SOFTW P, P1, DOI [10.1109/CIMPS.2016.7802810, DOI 10.1109/CIMPS.2016.7802810]
[3]
Chen JG, 2011, LECT NOTES COMPUT SC, V7001, P32, DOI 10.1007/978-3-642-24861-0_3
[4]
Cover T. M., 2006, Elements of Information Theory: Solutions to Problems, V2nd
[5]
Dhiman A., 2019, COMMUN COMPUT INF SC, V839, P308, DOI [10.1007/978-981-13-2372-0_27, DOI 10.1007/978-981-13-2372-0_27]
[6]
Dodge Y., 2008, The concise encyclopedia of statistics
[7]
Golic J.D., 2008, IACR Cryptology ePrint Archive, V2008, P348
[8]
Golic J.D., 2000, Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, P220
[9]
Grosul A.L., 2000, A related-key cryptanalysis of RC4
[10]
Jindal Poonam, 2019, Microelectronics, Electromagnetics and Telecommunications. Proceedings of the Fourth ICMEET 2018. Lecture Notes in Electrical Engineering (LNEE 521), P367, DOI 10.1007/978-981-13-1906-8_38