-
1
-
-
80054796327
-
Secrecy from resolvability
-
submitted to, November, Online. Available: arXiv:1105.5419
-
M. R. Bloch and J. N. Laneman, "Secrecy from Resolvability", submitted to IEEE Transactions on Information Theory, November 2011. [Online]. Available: arXiv:1105.5419
-
(2011)
IEEE Transactions on Information Theory
-
-
Bloch, M.R.1
Laneman, J.N.2
-
3
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Lecture Notes in Computer Science. B. Preneel
-
U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free", in Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science. B. Preneel, 2000, p. 351.
-
(2000)
Advances in Cryptology - Eurocrypt 2000
, pp. 351
-
-
Maurer, U.M.1
Wolf, S.2
-
4
-
-
33750056552
-
Almost independence and secrecy capacity
-
January-March
-
I. Csiszár, "Almost Independence and Secrecy Capacity", Problems of Information Transmission, vol. 32, no. 1, pp. 40-47, January-March 1996.
-
(1996)
Problems of Information Transmission
, vol.32
, Issue.1
, pp. 40-47
-
-
Csiszár, I.1
-
5
-
-
80051775152
-
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
-
September
-
A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, "Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes", IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, September 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
-
-
Subramanian, A.1
Thangaraj, A.2
Bloch, M.3
McLaughlin, S.4
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages", IEEE Trans. on Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. on Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
7
-
-
0016562514
-
The wire-tap channel
-
October
-
A. D. Wyner, "The Wire-Tap Channel", Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
8
-
-
77955673446
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
July, submitted to, Online. Available: arXiv:1007.3568v1
-
H. Mahdavifar and A. Vardy, "Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes", July 2010, submitted to IEEE Trans. Inf. Theory. [Online]. Available: arXiv:1007.3568v1
-
(2010)
IEEE Trans. Inf. Theory
-
-
Mahdavifar, H.1
Vardy, A.2
-
9
-
-
77953825394
-
Two edge type LDPC codes for the wiretap channel
-
V. Rathi, M. Andersson, R. Thobaben, J. Kliewer, and M. Skoglund, "Two edge type LDPC codes for the wiretap channel", in Proc. Conf Signals, Systems and Computers Record of the Forty-Third Asilomar Conf, 2009, pp. 834-838.
-
(2009)
Proc. Conf Signals, Systems and Computers Record of the Forty-Third Asilomar Conf
, pp. 834-838
-
-
Rathi, V.1
Andersson, M.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
10
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. Han and S. Verdú, "Approximation Theory of Output Statistics", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.1
Verdú, S.2
-
11
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels
-
April
-
M. Hayashi, "General Nonasymptotic and Asymptotic Formulas in Channel Resolvability and Identification Capacity and their Application to the Wiretap Channels", IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, April 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
12
-
-
80054800559
-
Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels
-
Cachan, France, May, invited
-
L. Luzzi and M. R. Bloch, "Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels", in Proc. of 1st. International Workshop on Secure Wireless Networks, Cachan, France, May 2011, (invited).
-
(2011)
Proc. of 1st. International Workshop on Secure Wireless Networks
-
-
Luzzi, L.1
Bloch, M.R.2
-
13
-
-
54749144274
-
Second-order asymptotics in fixed-length source coding and intrinsic randomness
-
October
-
M. Hayashi, "Second-Order Asymptotics in Fixed-Length Source Coding and Intrinsic Randomness", IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4619-4637, October 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4619-4637
-
-
Hayashi, M.1
-
14
-
-
77956485799
-
Strongly secure privacy amplification cannot be obtained by encoder of slepian-wolf code
-
September
-
S. Watanabe, R. Matsumoto, and T. Uyematsu, "Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E93-A, no. 9, pp. 1650-1659, September 2010.
-
(2010)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E93-A
, Issue.9
, pp. 1650-1659
-
-
Watanabe, S.1
Matsumoto, R.2
Uyematsu, T.3
|