Constrained many-to-one string editing with memory
From MaRDI portal
Publication:1358830
DOI10.1016/0020-0255(95)00047-SzbMath0871.94044MaRDI QIDQ1358830
Slobodan V. Petrović, Jovan Dj. Golić
Publication date: 23 June 1997
Published in: Information Sciences (Search for Journal in Brave)
synchronizationcryptanalysisrecursive algorithmsubstitutiondeletioninsertionedit distancestring editing
Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Communication, information (94A99)
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Constrained string editing
- String editing under a combination of constraints
- A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
- Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
- An Overview of Sequence Comparison: Time Warps, String Edits, and Macromolecules
- On secret sharing communication systems with two or three channels
- The rate-distortion region for multiple descriptions without excess rate
- Recognition of Noisy Subsequences Using Constrained Edit Distances
- On the Theory and Computation of Evolutionary Distances
- Decoding for channels with insertions, deletions, and substitutions with applications to speech recognition