International Journal on Minority and Group Rights. Том 10. 2003. С. 203-220
This paper states the results of the probabilistic analysis of the secrecy of both splitting method and generalized splitting method, which is studied in details in the previous authors' article [1-5], from a hacker's point of view with unauthorized access to the transmission channel.