@dblp

An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext.

, and . ICC, page 749-754. IEEE, (2014)

Links and resources

Tags