Similarities between Coding theory and Information-theoretic security
Coding theory and Information-theoretic security have 5 things in common (in Unionpedia): Adversary (cryptography), Claude Shannon, Information theory, MIMO, One-time pad.
Adversary (cryptography)
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data).
Adversary (cryptography) and Coding theory · Adversary (cryptography) and Information-theoretic security ·
Claude Shannon
Claude Elwood Shannon (April 30, 1916 – February 24, 2001) was an American mathematician, electrical engineer, and cryptographer known as "the father of information theory".
Claude Shannon and Coding theory · Claude Shannon and Information-theoretic security ·
Information theory
Information theory studies the quantification, storage, and communication of information.
Coding theory and Information theory · Information theory and Information-theoretic security ·
MIMO
In radio, multiple-input and multiple-output, or MIMO (pronounced or), is a method for multiplying the capacity of a radio link using multiple transmit and receive antennas to exploit multipath propagation.
Coding theory and MIMO · Information-theoretic security and MIMO ·
One-time pad
In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent.
Coding theory and One-time pad · Information-theoretic security and One-time pad ·
The list above answers the following questions
- What Coding theory and Information-theoretic security have in common
- What are the similarities between Coding theory and Information-theoretic security
Coding theory and Information-theoretic security Comparison
Coding theory has 124 relations, while Information-theoretic security has 31. As they have in common 5, the Jaccard index is 3.23% = 5 / (124 + 31).
References
This article shows the relationship between Coding theory and Information-theoretic security. To access each article from which the information was extracted, please visit: