-
1
-
-
77955596749
-
Nested polar codes for wiretap and relay channels
-
Aug.
-
M. Andersson, V. Rathi, R. Thobaben, J. Kliewer, and M. Skoglund, "Nested polar codes for wiretap and relay channels," IEEE Commun. Lett., 14, no. 8, 752-754, Aug. 2010.
-
(2010)
IEEE Commun. Lett.
, vol.14
, Issue.8
, pp. 752-754
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
2
-
-
46349104863
-
A performance comparison of polar codes and Reed-Muller codes
-
Jun.
-
E.Arikan, "A performance comparison of polar codes and Reed-Muller codes," IEEE Commun. Lett., 12, no. 6, 447-449, Jun. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.6
, pp. 447-449
-
-
Arikan, E.1
-
3
-
-
67650099990
-
Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels
-
Jul.
-
E. Arikan, "Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels," IEEE Trans. Inf. Theory, 55, no. 7, 3051-3073, Jul. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.7
, pp. 3051-3073
-
-
Arikan, E.1
-
6
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
Miami Beach, FL, Oct.
-
M. Bellare,A. Desai, E. Jokipii, and P. Rogaway, "A concrete security treatment of symmetric encryption," in Proc. IEEE Symp. Foundations Computer Science, Miami Beach, FL, Oct. 1997, 394-403.
-
(1997)
Proc. IEEE Symp. Foundations Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
7
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, 41, no. 6, 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
8
-
-
70449493465
-
Invertible extractors and wiretap protocols
-
Seoul, Korea
-
M. Cheraghchi, F. Didier, and A. Shokrollahi, "Invertible extractors and wiretap protocols," in Proc. IEEE Int. Symp. Information Theory, Seoul, Korea, 2009, 1934-1938.
-
(2009)
Proc. IEEE Int. Symp. Information Theory
, pp. 1934-1938
-
-
Cheraghchi, M.1
Didier, F.2
Shokrollahi, A.3
-
10
-
-
48649107830
-
Syndrome-coding for the wiretap channel revisited
-
Chengdu, China, Oct.
-
G. Cohen and G. Zémor, "Syndrome-coding for the wiretap channel revisited," in Proc. IEEE Information Theory Workshop, Chengdu, China, Oct. 2006, 33-36.
-
(2006)
Proc. IEEE Information Theory Workshop
, pp. 33-36
-
-
Cohen, G.1
Zémor, G.2
-
12
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, IT-24, no. 3, 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
13
-
-
33947401071
-
Soft-decision decoding of Reed-Muller codes: Recursive lists
-
Mar.
-
I. Dumer and K. Shabunov, "Soft-decision decoding of Reed-Muller codes: Recursive lists," IEEE Trans. Inf. Theory, 52, no. 3, 1260-1266, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.3
, pp. 1260-1266
-
-
Dumer, I.1
Shabunov, K.2
-
16
-
-
77955685987
-
On the scaling of polar codes: The behavior of polarized channels
-
Austin, TX, Jun.
-
S. Hassani and R. L. Urbanke, "On the scaling of polar codes: The behavior of polarized channels," in Proc. IEEE Int. Symp. Information Theory, Austin, TX, Jun. 2010, 874-878.
-
(2010)
Proc. IEEE Int. Symp. Information Theory
, pp. 874-878
-
-
Hassani, S.1
Urbanke, R.L.2
-
17
-
-
80051948767
-
Secrecy-achieving polar-coding
-
Dublin, Ireland, Aug.-Sep.
-
E. Hof and S. Shamai, "Secrecy-achieving polar-coding," in Proc. IEEE Information Theory Workshop, Dublin, Ireland, Aug.-Sep. 2010, 1-5.
-
(2010)
Proc. IEEE Information Theory Workshop
, pp. 1-5
-
-
Hof, E.1
Shamai, S.2
-
18
-
-
70449484484
-
Performance of polar codes for channel and source coding
-
Seoul, Korea,Jun.
-
N. Hussami, R. L. Urbanke, and S. B. Korada, "Performance of polar codes for channel and source coding," in Proc. IEEE Int. Symp. Information Theory, Seoul, Korea, Jun. 2009, 1488-1492.
-
(2009)
Proc. IEEE Int. Symp. Information Theory
, pp. 1488-1492
-
-
Hussami, N.1
Urbanke, R.L.2
Korada, S.B.3
-
19
-
-
76249131134
-
-
Ph.D. dissertation,EPFL, Lausanne, Switzerland
-
S. B. Korada, "Polar Codes for Channel and Source Coding," Ph.D. dissertation, EPFL, Lausanne, Switzerland, 2009.
-
(2009)
Polar Codes for Channel and Source Coding
-
-
Korada, S.B.1
-
20
-
-
70449503182
-
Polar codes: Characterization of exponent, bounds, and constructions
-
Jun., Seoul, Korea
-
S. B. Korada, E. Sasoglu, and R. L. Urbanke, "Polar codes: Characterization of exponent, bounds, and constructions," in Proc. IEEE Int. Symp. Information Theory, Seoul, Korea, Jun. 2009, 1483-1487.
-
(2009)
Proc. IEEE Int. Symp. Information Theory
, pp. 1483-1487
-
-
Korada, S.B.1
Sasoglu, E.2
Urbanke, R.L.3
-
21
-
-
78751480777
-
Polar coding for secure transmission and key agreement
-
Istanbul, Turkey, Sep.
-
O. O. Koyluoglu and H. El Gamal, "Polar coding for secure transmission and key agreement," in Proc. IEEE Int. Symp. Personal Indoor and Mobile Radio Comm., Istanbul, Turkey, Sep. 2010, 2698-2703.
-
(2010)
Proc. IEEE Int. Symp. Personal Indoor and Mobile Radio Comm.
, pp. 2698-2703
-
-
Koyluoglu, O.O.1
El Gamal, H.2
-
22
-
-
0017537504
-
On a special class of wire-tap channels
-
Sep.
-
S. Leung-Yan-Cheong, "On a special class of wire-tap channels," IEEE Trans. Inf. Theory, IT-23, no. 5, 625-627, Sep. 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.23 IT
, Issue.5
, pp. 625-627
-
-
Leung-Yan-Cheong, S.1
-
23
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, IT-24, no. 4, 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.E.2
-
24
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," Found. and Trends in Commun. and Inf. Theory, 5, no. 4-5, 355-580, 2008.
-
(2008)
Found. and Trends in Commun. and Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
26
-
-
77955673446
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Austin, TX, Jun.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," in Proc. IEEE Int. Symp. Information Theory, Austin, TX, Jun. 2010, 913-917.
-
(2010)
Proc. IEEE Int. Symp. Information Theory
, pp. 913-917
-
-
Mahdavifar, H.1
Vardy, A.2
-
28
-
-
0005059185
-
The strong secret key rate of discrete random triples
-
R. Blahut, Ed. et al., Boston, MA
-
U. M. Maurer, "The strong secret key rate of discrete random triples," in Communication and Cryptography-Two Sides of One Tapestry, R. Blahut, Ed. et al., Boston, MA, 1994, 271-285.
-
(1994)
Communication and Cryptography-Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
29
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer, Berlin, Germany
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Lecture Notes in Computer Science. Berlin, Germany: Springer, 2000, 1807, 351-368.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
30
-
-
70449463210
-
Performance and construction of polar codes on symmetric binary-input memoryless channels
-
Seoul, Korea, Jun.
-
R. Mori and T. Tanaka, "Performance and construction of polar codes on symmetric binary-input memoryless channels," in Proc. IEEE Int. Symp. Information Theory, Seoul, Korea, Jun. 2009, 1496-1500.
-
(2009)
Proc. IEEE Int. Symp. Information Theory
, pp. 1496-1500
-
-
Mori, R.1
Tanaka, T.2
-
31
-
-
68349135129
-
Performance of polar codes with the construction using density evolution
-
Jul.
-
R. Mori and T. Tanaka, "Performance of polar codes with the construction using density evolution," IEEE Commun. Lett., 13, no. 7, 519-521, Jul. 2009.
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.7
, pp. 519-521
-
-
Mori, R.1
Tanaka, T.2
-
33
-
-
0021595510
-
Wire-tap channel II
-
Dec.
-
L. H. Ozarow and A. D.Wyner, "Wire-tap channel II," Bell Lab. Tech. J., 63, no. 10, 2135-2157, Dec. 1984.
-
(1984)
Bell Lab. Tech. J.
, vol.63
, Issue.10
, pp. 2135-2157
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
34
-
-
77951624674
-
Channel coding rate in the finite blocklength regime
-
May
-
Y. Polyanskiy, H. V. Poor, and S. Verdú, "Channel coding rate in the finite blocklength regime," IEEE Trans. Inf. Theory, 56, no. 5, 2307-2359, May 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2307-2359
-
-
Polyanskiy, Y.1
Poor, H.V.2
Verdú, S.3
-
35
-
-
76249132084
-
Polarization for arbitrary discrete memoryless channels
-
Taormina, Italy, Oct.
-
E. Sasoglu, E. Telatar, and E. Arikan, "Polarization for arbitrary discrete memoryless channels," in Proc. IEEE Information Theory Workshop, Taormina, Italy, Oct. 2009, 144-148.
-
(2009)
Proc. IEEE Information Theory Workshop
, pp. 144-148
-
-
Sasoglu, E.1
Telatar, E.2
Arikan, E.3
-
36
-
-
52349101372
-
Asymptotische abschätzungen in Shannon's information stheorie
-
Prague, Czechoslovakia
-
V. Strassen, "Asymptotische abschätzungen in Shannon's informationstheorie," in Proc. 3rd Conf. Information Theory, Statistical Decision Functions, and Random Processes, Prague, Czechoslovakia, 1964, 689-732.
-
(1964)
Proc. 3rd Conf. Information Theory, Statistical Decision Functions, and Random Processes
, pp. 689-732
-
-
Strassen, V.1
-
37
-
-
80051953037
-
Strong secrecy for erasure wiretap channels
-
Dublin, Ireland, Sep.
-
A. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, "Strong secrecy for erasure wiretap channels," in Proc. IEEE Information Theory Workshop, Dublin, Ireland, Sep. 2010.
-
(2010)
Proc. IEEE Information Theory Workshop
-
-
Suresh, A.1
Subramanian, A.2
Thangaraj, A.3
Bloch, M.4
McLaughlin, S.W.5
-
39
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug.
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, 53, no. 8, 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.5
-
40
-
-
0031103783
-
On a special class of broadcast channels with confidential messages
-
Mar.
-
M. V. Dijk, "On a special class of broadcast channels with confidential messages," IEEE Trans. Inf. Theory, 43, no. 2, 712-714, Mar. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.2
, pp. 712-714
-
-
Dijk, M.V.1
-
41
-
-
0026219389
-
Generalized hamming weights for linear codes
-
Sep.
-
V. K. Wei, "Generalized Hamming weights for linear codes," IEEE Trans. Inf. Theory, 37, no. 5, 1412-1418, Sep. 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.5
, pp. 1412-1418
-
-
Wei, V.K.1
-
42
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., 54, no. 8, 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
43
-
-
0031104068
-
Joint equalization and coding for intersymbol interference channels
-
Mar.
-
D. Yellin, A. Vardy, and O. Amrani, "Joint equalization and coding for intersymbol interference channels," IEEE Trans. Inf. Theory, 43, no. 2, 409-425, Mar. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.2
, pp. 409-425
-
-
Yellin, D.1
Vardy, A.2
Amrani, O.3
|