Information Theory

Related Fields

Parent Topic:

Mathematics, Computer Science, Statistics

Child Topic:

Randomization function, Bombe, Lloyd's algorithm, Information processor, Binary entropy function, Occupancy grid mapping, Compression artifact, Score, Information diagram, BB84, Lossless compression, Entropy estimation, Channel capacity, Measurement of biodiversity, Macroblock, ISAAC, A priori probability, Inductive probability, Information exchange, Rake receiver, Rate–distortion theory, Panjer recursion, Systematic code, Succinct data structure, Prediction by partial matching, Shamir's Secret Sharing, Randomness extractor, Zero-forcing precoding, Strong cryptography, Hamming bound, Jaccard index, Semantic security, Unicity distance, Data terminal equipment, Return channel, Steganalysis, Steganography, Interpolation attack, Space–time tradeoff, Chip, Jensen's inequality, WSSUS model, Noise floor, Centroidal Voronoi tessellation, Group code, Force of mortality, Bernoulli process, Stochastic geometry, Rubber-hose cryptanalysis, Block size, Universal hashing, Models of communication, U-statistic, Cryptosystem, Tanner graph, Data compression ratio, Mean difference, Covering code, JEDEC memory standards, PSK31, Boomerang attack, Checksum, Sound quality, Hamming distance, Smoke signal, Move-to-front transform, Yates's correction for continuity, ROT13, Key size, Statistical theory, Snefru, Statistical signal processing, Rényi entropy, Additive smoothing, Frequentist inference, Adaptive Multi-Rate audio codec, Shannon's source coding theorem, Dining cryptographers problem, Brute-force attack, McEliece cryptosystem, Bit, Rate–distortion optimization, Decoding methods, Pseudorandom generator, Intersymbol interference, Dictionary attack, Viterbi decoder, Locally decodable code, Akaike information criterion, Bitstream, Erasure code, Constellation diagram, Data differencing, Least significant bit, Co-channel interference, Likelihood-ratio test, Scytale, Circular uniform distribution, Low-density parity-check code, Preimage attack, Correlation attack, Invisible ink, Uncompressed video, Singleton bound, Digital cable, Steganography tools, BCH code, Excess-3, Tree diagram, Maximum entropy spectral estimation, Bit-length, Channel, Secure multi-party computation, Byte, Bayesian multivariate linear regression, Tornado code, Reed–Solomon error correction, Fluctuation theorem, Loschmidt's paradox, Spectral efficiency, Distress signal, Permutation box, Arithmetic coding, Factor graph, Cryptanalysis, H.263, Transmission, Sense amplifier, Attack model, Napierian logarithm, Information needs, Position weight matrix, Normality test, Switched capacitor, Expander code, One-time pad, Kraft's inequality, Solomonoff's theory of inductive inference, Interaction information, Posterior probability, Hybrid cryptosystem, Equiprobability, Shannon–Hartley theorem, Transfer entropy, Fortuna, Advantage, Bit stuffing, Sample, Gibbs' inequality, Oblivious transfer, Entropy, Line code, Stream cipher, Log-distance path loss model, Spread spectrum, Fractal compression, Atkinson index, Statistical randomness, 3-Way, Belief propagation, Locally testable code, Continuum percolation theory, Random permutation, Bit manipulation, Rate function, Perceptual system, Skipjack, Wire speed, Block cipher, Hybrid automatic repeat request, Channel code, Playfair cipher, Gambling and information theory, Information transfer, Observed information, Data scrubbing, Perplexity, NT LAN Manager, Rand index, High-bit-rate digital subscriber line, Superframe, Spatial correlation, Most significant bit, Multiple encryption, Forward error correction, Digital radio, Cyclic code, Generalized relative entropy, Jensen–Shannon divergence, SerDes, Bayesian linear regression, Block cipher mode of operation, BCJR algorithm, Signal-to-interference ratio, Ciphertext, Contact analysis, Burst error-correcting code, Algebraic code-excited linear prediction, Generalized entropy index, LM hash, Group of pictures, Point-to-multipoint communication, Deviance information criterion, Bell Laboratories Layered Space-Time, C4.5 algorithm, Grey relational analysis, Boolean model, Bayesian experimental design, Tsallis entropy, Species evenness, Pseudorandom number generator, Adaptability, Phase-shift keying, MPEG-4 Part 2, Non-return-to-zero, Water filling algorithm, Hamming weight, Substitution cipher, Kilobit, Malleability, Negentropy, Confusion and diffusion, Kerckhoffs's principle, Longitudinal redundancy check, Data circuit-terminating equipment, Cryptography standards, Adaptive coding, Cramér's theorem, Polling system, Chain code, Hash function, Extractor, Random variable, Challenge–response authentication, Binary erasure channel, Code word, Precoding, Sørensen–Dice coefficient, Additive white Gaussian noise, Decoder, Edit distance, Nyquist rate, Password strength, Birthday attack, RC4, Block code, G-test, Binary symmetric channel, Communication source, Cramér–Rao bound, Hadamard code, Shrinking generator, Forney algorithm, Affine cipher, Symmetric-key algorithm, f-divergence, 40-bit encryption, Vuong's closeness test, Ciphertext indistinguishability, Self-information, Jaro–Winkler distance, Triple modular redundancy, Conditionality principle, Zettabyte, Linear code, Block Truncation Coding, Stability, Linear cryptanalysis, Spatial multiplexing, Global motion compensation, Shannon–Fano coding, Transcoding, Convolutional code, Cryptography, Diversity scheme, MIMO, Quadrature amplitude modulation, MA plot, Store and forward, Delay-tolerant networking, Computational hardness assumption, Maximum entropy probability distribution, EXIT chart, Secure channel, Casting out nines, H.261, Noise, Hartley function, Total correlation, Differential entropy, Statistical inference, Data compaction, XSL attack, Memory scrubbing, Turbo equalizer, Bandwidth, Model selection, JBIG2, Adjusted mutual information, Multipath propagation, Informating, MPEG-2, Data signaling rate, Random seed, Range encoding, Approximate string matching, Probabilistic encryption, Binary logarithm, Terabit, Verifiable secret sharing, Map communication model, /dev/random, Padding, Tiny Encryption Algorithm, Information algebra, Constant-weight code, Trellis modulation, Hyperparameter, Quantum relative entropy, Squashed entanglement, Passphrase, Lempel–Ziv–Oberhumer, Lee distance, Magnetic trap, Multi-user MIMO, Plaintext, Zero suppression, Conditional entropy, Dual modular redundancy, Colossus computer, Bayesian information criterion, Bayes' theorem, Binary code, Commitment scheme, Integrated information theory, Incomplete Nature, Chien search, S-box, Error floor, Huffman coding, Variable-length code, Minimum distance estimation, Joint entropy, Sponge function, Mobility model, Image compression, Tap code, Orthogonal frequency-division multiplexing, Incremental encoding, Rainbow table, Multinomial test, Common Scrambling Algorithm, Entropy rate, Multidimensional parity-check code, Transform coding, Kullback–Leibler divergence, Secret sharing, Pointwise mutual information, False positive paradox, Integral cryptanalysis, Fading, Error detection and correction, Eb/N0, Binomial test, Manchester code, Bernstein–von Mises theorem, Soft-decision decoder, Receiver, Differential cryptanalysis, Information-theoretic security, Generalized Dirichlet distribution, Tunstall coding, Data striping, Space–time code, Sequential decoding, Information gain ratio, Noise, Rician fading, Coding gain, Concatenated error correction code, Coding theory, Data, Adaptive chosen-ciphertext attack, Morse code, Baud, Automatic repeat request, DEFLATE, Coherence bandwidth, Macrodiversity, Diversity index, Multicast, Relay channel, Conservatism, 8b/10b encoding, Minkowski distance, Conditional mutual information, Bayesian inference, Lossy compression, Context-adaptive binary arithmetic coding, Repetition code, Residual frame, Serial concatenated convolutional codes, Data compression, Related-key attack, Slide attack, Substitution-permutation network, Petabit, Berlekamp–Welch algorithm, Context-adaptive variable-length coding, Ciphertext-only attack, Units of information, Codec, Code, Weak key, Polynomial code, Kelly criterion, Antenna diversity, Transposition cipher, Fountain code, T-function, Turbo code, Luby transform code, Bregman divergence, Frame synchronization, Distributed source coding, LZ77 and LZ78, Principle of maximum entropy, Carrier-to-noise ratio, Information bottleneck method, Dirac, Salt, Berlekamp–Massey algorithm, Maxwell's demon, Exchangeable random variables, Bayes factor, Full cycle, Frequency analysis, Canonical Huffman code, Link adaptation, Algorithmic information theory, Data transmission, Cryptographic hash function, Confidence distribution, Ultra-wideband, Polyalphabetic cipher, Fano's inequality, Grammar-based code, Hamming code, Multimedia Broadcast Multicast Service, Scoring algorithm, Normalized compression distance, Contingency table, Hick's law, International Data Encryption Algorithm, Multivariate mutual information, Quantum discord, von Mises distribution, Entropy power inequality, Data conversion, Delta encoding, Qualitative variation, Exabyte, Damerau–Levenshtein distance, Asymptotic equipartition property, Probability of error, Signal-to-interference-plus-noise ratio, Nakagami distribution, Ciphertext stealing, Communication theory, Golomb coding, Wagner–Fischer algorithm, Bayes' rule, Burst error, Smart antenna, Two-way communication, Tactical communications, Megabit, Exterior Gateway Protocol, Generator matrix, Trellis quantization, Geometric probability, String searching algorithm, Algorithmic probability, Multiview Video Coding, Whittaker–Shannon interpolation formula, Log sum inequality, Uncertainty coefficient, Statistical distance, Stop-and-wait ARQ, Symbol rate, Parity-check matrix, Additive Markov chain, Known-plaintext attack, Run-length encoding, Extreme value theory, Message, Iterative proportional fitting, Key, List decoding, Code rate, Entropy encoding, Blinding, Prefix code, Timing attack, Typical set, Raptor code, Score test, Chosen-ciphertext attack, Laplace principle, Parity bit, Standard array, Millman's theorem, Cross entropy, Algorithmic inference, Ziggurat algorithm, Stationary sequence, Fisher information, Interference, Deterministic encryption, Quantum mutual information, Pearson's chi-squared test, Minimum message length, Universal code, Unary coding, Kolmogorov structure function, Power analysis, Landauer's principle, Post-quantum cryptography, Codebook, Caesar cipher, Cyclic redundancy check, Deniable encryption, Hellinger distance, Self-synchronizing code, Specified complexity, Nihilist cipher, GBDE, Empirical distribution function, Encoder, Variation of information, Diversity combining, Hardware random number generator, Theil index, Goodman and Kruskal's lambda, Principle of indifference, ID3 algorithm, Coherent information, Avalanche effect, FISH, Exact test, Fluhrer, Mantin and Shamir attack, Running key cipher, H-theorem, Shared secret, Quantum energy teleportation, Multiplicative noise, Joint probability distribution, Gigabit, Shannon–Weaver model, Earth mover's distance, Quantities of information, Nat, Algorithmically random sequence, Center frequency, String metric, Free energy principle, Entropic uncertainty, Chroma subsampling, Large deviations theory, Noisy-channel coding theorem, Brownian ratchet, Alice and Bob, Prior probability, Coding tree unit, Min entropy, Bit error rate, Whirlpool, Information, Burrows–Wheeler transform, Forward secrecy, Bandwidth extension, Microdot, Two-square cipher, Cryptographically secure pseudorandom number generator, Impossible differential cryptanalysis, Motion compensation, Computational indistinguishability, Generation loss, Message authentication code, Channel state information, Linear feedback shift register, Code, Reed–Muller code, Constructor theory, Unicast, Q code, Minimum description length, Error exponent, Information flow, MIMO-OFDM, Linear network coding, Mutual information, Key Wrap

Top Authors

Paper Recommendation
1963 A Mathematical Theory of Communication

1991 Elements of information Theory

2000 Quantum Computation and Quantum information

1998 On Limits of Wireless Communications in A Fading Environment When UsingMultiple Antennas

1961 Error-correcting Codes

1959 Information Theory and Statistics

1956 The Magical Number Seven, Plus Or Minus Two: Some Limits on Our Capacity For Processing information

1962 Visual Pattern Recognition By Moment invariants

1957 Information Theory and Statistical Mechanics

1965 Principles of Communication Engineering

1976 New Directions in Cryptography

1960 Quantizing For Minimum Distortion

1982 Theory and Application of Trapdoor Functions

1977 Controlled and Automatic Human information Processing: 11. Perceptual Learning, Automatic attending, and A General Theory.

1991 Quantum Cryptography Based on Bell's Theorem

1978 Digital Signal Processing

1978 Compression of individual Sequences Via Variable-rate Coding

1997 Formal Concept Analysis: Mathematical Foundations

1956 Science and information Theory

1995 Wavelets and Subband Coding