{"id":"https://openalex.org/W3175101285","doi":"https://doi.org/10.1109/tit.2022.3158475","title":"Guessing Based on Compressed Side Information","display_name":"Guessing Based on Compressed Side Information","publication_year":2022,"publication_date":"2022-03-11","ids":{"openalex":"https://openalex.org/W3175101285","doi":"https://doi.org/10.1109/tit.2022.3158475","mag":"3175101285"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2022.3158475","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2022.3158475","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034384029","display_name":"Robert Graczyk","orcid":"https://orcid.org/0000-0003-3761-3161"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Robert Graczyk","raw_affiliation_strings":["Signal and Information Processing Laboratory, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"],"raw_orcid":"https://orcid.org/0000-0003-3761-3161","affiliations":[{"raw_affiliation_string":"Signal and Information Processing Laboratory, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059036901","display_name":"Amos Lapidoth","orcid":"https://orcid.org/0000-0002-4742-5124"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amos Lapidoth","raw_affiliation_strings":["Signal and Information Processing Laboratory, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"],"raw_orcid":"https://orcid.org/0000-0002-4742-5124","affiliations":[{"raw_affiliation_string":"Signal and Information Processing Laboratory, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028774270","display_name":"Neri Merhav","orcid":"https://orcid.org/0000-0002-9547-3243"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Neri Merhav","raw_affiliation_strings":["Viterbi Faculty of Electrical and Computer Engineering, Technion, Haifa, Israel"],"raw_orcid":"https://orcid.org/0000-0002-9547-3243","affiliations":[{"raw_affiliation_string":"Viterbi Faculty of Electrical and Computer Engineering, Technion, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061563791","display_name":"Christoph Pfister","orcid":"https://orcid.org/0000-0001-6422-1433"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christoph Pfister","raw_affiliation_strings":["Signal and Information Processing Laboratory, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"],"raw_orcid":"https://orcid.org/0000-0001-6422-1433","affiliations":[{"raw_affiliation_string":"Signal and Information Processing Laboratory, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034384029"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2771,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.50937921,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"68","issue":"7","first_page":"4244","last_page":"4256"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.7132135629653931},{"id":"https://openalex.org/keywords/rate\u2013distortion-theory","display_name":"Rate\u2013distortion theory","score":0.6680727005004883},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.644781231880188},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5718121528625488},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5556431412696838},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5328450798988342},{"id":"https://openalex.org/keywords/rate-distortion","display_name":"Rate distortion","score":0.5033292174339294},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.49585065245628357},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4672650694847107},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.43274638056755066},{"id":"https://openalex.org/keywords/exponential-function","display_name":"Exponential function","score":0.4326653778553009},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.4311105012893677},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.37901514768600464},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.3028262257575989},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.2735954523086548},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19224786758422852}],"concepts":[{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.7132135629653931},{"id":"https://openalex.org/C64185310","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate\u2013distortion theory","level":3,"score":0.6680727005004883},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.644781231880188},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5718121528625488},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5556431412696838},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5328450798988342},{"id":"https://openalex.org/C2982755384","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate distortion","level":3,"score":0.5033292174339294},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.49585065245628357},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4672650694847107},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.43274638056755066},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.4326653778553009},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.4311105012893677},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.37901514768600464},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.3028262257575989},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.2735954523086548},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19224786758422852},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2022.3158475","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2022.3158475","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1483547755","https://openalex.org/W1608472120","https://openalex.org/W1990742913","https://openalex.org/W2099111195","https://openalex.org/W2112267744","https://openalex.org/W2114085948","https://openalex.org/W2121427778","https://openalex.org/W2123097583","https://openalex.org/W2135469284","https://openalex.org/W2151170200","https://openalex.org/W2165203736","https://openalex.org/W2207345600","https://openalex.org/W2613764556","https://openalex.org/W2787743471","https://openalex.org/W2803741743","https://openalex.org/W2885856123","https://openalex.org/W2895239415","https://openalex.org/W2920861710","https://openalex.org/W2962685566","https://openalex.org/W2965588185","https://openalex.org/W2976423724","https://openalex.org/W3081102995","https://openalex.org/W3101823042","https://openalex.org/W3103643864","https://openalex.org/W4302366875","https://openalex.org/W6628834570"],"related_works":["https://openalex.org/W2000669813","https://openalex.org/W2070945723","https://openalex.org/W1413489299","https://openalex.org/W2963622735","https://openalex.org/W3103755690","https://openalex.org/W2163994639","https://openalex.org/W1506571411","https://openalex.org/W2057489919","https://openalex.org/W1965997304","https://openalex.org/W1969778210"],"abstract_inverted_index":{"A":[0],"source":[1],"sequence":[2,18],"is":[3,22,45],"to":[4],"be":[5,49],"guessed":[6],"with":[7,19],"some":[8],"fidelity":[9,75],"based":[10],"on":[11,85,97],"a":[12,78,98,103,108],"rate-limited":[13],"description":[14,28,71],"of":[15,35,39,43,55,60,66,80,90,105],"an":[16],"observed":[17],"which":[20],"it":[21],"correlated.":[23],"The":[24],"tension":[25],"between":[26],"the":[27,31,36,40,52,56,67,70,74,88,92],"rate":[29,34],"and":[30,62,73,82],"exponential":[32],"growth":[33],"power":[37],"mean":[38],"required":[41],"number":[42,79,104],"guesses":[44],"quantified.":[46],"This":[47],"can":[48],"viewed":[50],"as":[51],"guessing":[53],"version":[54],"classical":[57,83],"indirect-rate-distortion":[58],"problem":[59],"Dobrushin-Tsybakov\u201962":[61],"Witsenhausen\u201980.":[63],"Judicious":[64],"choices":[65],"correlated":[68,109],"sequence,":[69],"rate,":[72],"criterion":[76],"recover":[77],"recent":[81],"results":[84],"guessing.":[86],"In":[87],"context":[89],"security,":[91],"paper":[93],"provides":[94],"conservative":[95],"estimates":[96],"password\u2019s":[99],"remaining":[100],"security":[101],"after":[102],"bits":[106],"from":[107],"database":[110],"have":[111],"been":[112],"leaked.":[113]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
