-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
33750056552
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Problems Inf. Transmiss., vol. 32, no. 1, pp. 40-47, 1996.
-
(1996)
Problems Inf. Transmiss.
, vol.32
, Issue.1
, pp. 40-47
-
-
Csiszár, I.1
-
3
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
4
-
-
84865478919
-
Semantic security for the wiretap channel
-
Berlin, Germany: Springer-Verlag
-
M. Bellare, S. Tessaro, and A. Vardy, "Semantic security for the wiretap channel," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7417. Berlin, Germany: Springer-Verlag, 2012, pp. 294-311.
-
(2012)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.7417
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
5
-
-
80051775152
-
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
-
Sep.
-
A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 585-594, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 585-594
-
-
Subramanian, A.1
Thangaraj, A.2
Bloch, M.3
McLaughlin, S.4
-
6
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
7
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep.
-
D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.3
Barros, J.4
Kwak, B.-J.5
-
9
-
-
83655193063
-
On the eavesdropper's correct decision in Gaussian and fading wiretap channels using lattice codes
-
Oct.
-
A. Ernvall-Hytonen and C. Hollanti, "On the eavesdropper's correct decision in Gaussian and fading wiretap channels using lattice codes," in Proc. IEEE Inf. Theory Workshop (ITW), Oct. 2011, pp. 210-214.
-
(2011)
Proc. IEEE Inf. Theory Workshop (ITW)
, pp. 210-214
-
-
Ernvall-Hytonen, A.1
Hollanti, C.2
-
10
-
-
80051991715
-
Achievable rates for lattice coding over the Gaussian wiretap channel
-
Jun.
-
L.-C. Choo, C. Ling, and K.-K. Wong, "Achievable rates for lattice coding over the Gaussian wiretap channel," in Proc. IEEE Int. Conf. Commun. Workshops (ICC), Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun. Workshops (ICC)
, pp. 1-5
-
-
Choo, L.-C.1
Ling, C.2
Wong, K.-K.3
-
11
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov.
-
L. Lai, H. El Gamal, and H. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.3
-
12
-
-
5144221013
-
Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding
-
Oct.
-
U. Erez and R. Zamir, "Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.10
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
13
-
-
64549085982
-
Providing secrecy with lattice codes
-
Sep.
-
X. He and A. Yener, "Providing secrecy with lattice codes," in Proc. 46th Annu. Allerton Conf. Commun., Control, Comput., Sep. 2008, pp. 1199-1206.
-
(2008)
Proc. 46th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 1199-1206
-
-
He, X.1
Yener, A.2
-
14
-
-
79955504787
-
The Gaussian many-to-one interference channel with confidential messages
-
May
-
X. He and A. Yener, "The Gaussian many-to-one interference channel with confidential messages," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2730-2745, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2730-2745
-
-
He, X.1
Yener, A.2
-
15
-
-
84871819283
-
Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay
-
Jan.
-
X. He and A. Yener, "Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay," IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 177-192, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.1
, pp. 177-192
-
-
He, X.1
Yener, A.2
-
16
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Dec.
-
M. Bloch and J. Laneman, "Strong secrecy from channel resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8077-8098
-
-
Bloch, M.1
Laneman, J.2
-
17
-
-
84900481009
-
Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels
-
L. Luzzi and M. R. Bloch, "Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels," in Proc. 5th Int. ICST Conf. Perform. Eval. Methodol. Tools, 2011, pp. 641-647.
-
(2011)
Proc. 5th Int. ICST Conf. Perform. Eval. Methodol. Tools
, pp. 641-647
-
-
Luzzi, L.1
Bloch, M.R.2
-
18
-
-
84861398796
-
Secret key generation for correlated Gaussian sources
-
Jun.
-
S. Nitinawarat and P. Narayan, "Secret key generation for correlated Gaussian sources," IEEE Trans. Inf. Theory, vol. 58, no. 6, pp. 3373-3391, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.6
, pp. 3373-3391
-
-
Nitinawarat, S.1
Narayan, P.2
-
19
-
-
84890317698
-
Secret key generation from Gaussian sources using lattice hashing
-
Jul.
-
C. Ling, L. Luzzi, and M. Bloch, "Secret key generation from Gaussian sources using lattice hashing," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2013, pp. 2621-2625.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2621-2625
-
-
Ling, C.1
Luzzi, L.2
Bloch, M.3
-
20
-
-
70350294927
-
Lattice-based cryptography
-
D. J. Bernstein and J. Buchmann, Eds. Berlin, Germany: Springer-Verlag
-
D. Micciancio and O. Regev, "Lattice-based cryptography," in Post- Quantum Cryprography, D. J. Bernstein and J. Buchmann, Eds. Berlin, Germany: Springer-Verlag, 2008.
-
(2008)
Post- Quantum Cryprography
-
-
Micciancio, D.1
Regev, O.2
-
22
-
-
77955698393
-
Information theoretic security
-
Norwell, MA, USA: Now Publishers
-
Y. Liang, H. Poor, and S. Shamai, "Information theoretic security," in Foundations and Trends in Communications and Information Theory. Norwell, MA, USA: Now Publishers, 2009.
-
(2009)
Foundations and Trends in Communications and Information Theory
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
24
-
-
0003643241
-
-
3rd ed. New York, NY, USA: Springer-Verlag
-
J. H. Conway and N. J. A. Sloane, Sphere Packings, Lattices, and Groups, 3rd ed. New York, NY, USA: Springer-Verlag, 1998.
-
(1998)
Lattices, and Groups
-
-
Conway, J.H.1
Sloane, N.J.A.2
Packings, S.3
-
25
-
-
0028384933
-
On coding without restrictions for the AWGN channel
-
Mar.
-
G. Poltyrev, "On coding without restrictions for the AWGN channel," IEEE Trans. Inf. Theory, vol. 40, no. 2, pp. 409-417, Mar. 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.2
, pp. 409-417
-
-
Poltyrev, G.1
-
26
-
-
0031276871
-
Averaging bounds for lattices and linear codes
-
Nov.
-
H. A. Loeliger, "Averaging bounds for lattices and linear codes," IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1767-1773, Nov. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.6
, pp. 1767-1773
-
-
Loeliger, H.A.1
-
27
-
-
0000303291
-
New bounds in some transference theorems in the geometry of numbers
-
W. Banaszczyk, "New bounds in some transference theorems in the geometry of numbers," Math. Ann., vol. 296, no. 1, pp. 625-635, 1993.
-
(1993)
Math. Ann.
, vol.296
, Issue.1
, pp. 625-635
-
-
Banaszczyk, W.1
-
28
-
-
0034188157
-
Sphere-bound-achieving coset codes and multilevel coset codes
-
May
-
G. Forney, M. Trott, and S.-Y. Chung, "Sphere-bound-achieving coset codes and multilevel coset codes," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 820-850, May 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.3
, pp. 820-850
-
-
Forney, G.1
Trott, M.2
Chung, S.-Y.3
-
29
-
-
17744363914
-
Worst-case to average-case reductions based on Gaussian measures
-
Rome, Italy, Oct
-
D. Micciancio and O. Regev, "Worst-case to average-case reductions based on Gaussian measures," in Proc. Ann. Symp. Found. Comput. Sci., Rome, Italy, Oct. 2004, pp. 372-381.
-
(2004)
Proc. Ann. Symp. Found. Comput. Sci.
, pp. 372-381
-
-
Micciancio, D.1
Regev, O.2
-
30
-
-
83655191144
-
Lattice codes for the compute-and-forward protocol: The flatness factor
-
Paraty, Brazil, Oct.
-
J.-C. Belfiore, "Lattice codes for the compute-and-forward protocol: The flatness factor," in Proc. IEEE ITW, Paraty, Brazil, Oct. 2011, pp. 1-4.
-
(2011)
Proc. IEEE ITW
, pp. 1-4
-
-
Belfiore, J.-C.1
-
31
-
-
84867488674
-
Lattice codes achieving strong secrecy over the mod Gaussian channel
-
Cambridge, MA, USA, Jul.
-
C. Ling, L. Luzzi, and J.-C. Belfiore, "Lattice codes achieving strong secrecy over the mod Gaussian channel," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Cambridge, MA, USA, Jul. 2012, pp. 2306-2310.
-
(2012)
Proc. IEEE Int. Symp. Inform. Theory (ISIT)
, pp. 2306-2310
-
-
Ling, C.1
Luzzi, L.2
Belfiore, J.-C.3
-
32
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Victoria, BC, Canada
-
C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in Proc. 40th Annu. ACM Symp. Theory Comput., Victoria, BC, Canada, 2008, pp. 197-206.
-
(2008)
Proc. 40th Annu. ACM Symp. Theory Comput.
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
34
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," J. ACM, vol. 56, no. 6, pp. 34:1-34:40, 2009.
-
(2009)
J. ACM
, vol.56
, Issue.6
, pp. 3401-3440
-
-
Regev, O.1
-
35
-
-
5144231861
-
On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener
-
G. D. Forney, "On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener," in Proc. 41st Allerton Conf. Commun., Control Comput., 2003, pp. 430-439.
-
(2003)
Proc. 41st Allerton Conf. Commun., Control Comput.
, pp. 430-439
-
-
Forney, G.D.1
-
36
-
-
26844546304
-
Lattices which are good for (almost) everything
-
Oct.
-
U. Erez, S. Litsyn, and R. Zamir, "Lattices which are good for (almost) everything," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401-3416, Oct. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.10
, pp. 3401-3416
-
-
Erez, U.1
Litsyn, S.2
Zamir, R.3
-
37
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. Han and S. Verdu, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.1
Verdu, S.2
-
38
-
-
0030191118
-
On lattice quantization noise
-
Jul.
-
R. Zamir and M. Feder, "On lattice quantization noise," IEEE Trans. Inf. Theory, vol. 42, no. 4, pp. 1152-1159, Jul. 1996.
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.4
, pp. 1152-1159
-
-
Zamir, R.1
Feder, M.2
-
39
-
-
84945713988
-
Coset codes. I. Introduction and geometrical classification
-
Sep.
-
G. D. Forney, Jr., "Coset codes. I. Introduction and geometrical classification," IEEE Trans. Inf. Theory, vol. 34, no. 5, pp. 1123-1151, Sep. 1988.
-
(1988)
IEEE Trans. Inf. Theory
, vol.34
, Issue.5
, pp. 1123-1151
-
-
Forney, G.D.1
-
40
-
-
0033896372
-
Finding the closest lattice vector when it's unusually close
-
P. Klein, "Finding the closest lattice vector when it's unusually close," in Proc. ACM-SIAM Symp. Discrete Algorithms, 2000, pp. 937-941.
-
(2000)
Proc. ACM-SIAM Symp. Discrete Algorithms
, pp. 937-941
-
-
Klein, P.1
-
41
-
-
80052349133
-
Decoding by sampling: A randomized lattice algorithm for bounded-distance decoding
-
Sep.
-
S. Liu, C. Ling, and D. Stehlé, "Decoding by sampling: A randomized lattice algorithm for bounded-distance decoding," IEEE Trans. Inf. Theory, vol. 57, no. 9, pp. 5933-5945, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.9
, pp. 5933-5945
-
-
Liu, S.1
Ling, C.2
Stehlé, D.3
-
43
-
-
79960678507
-
Compute-and-forward: Harnessing interference through structured codes
-
Oct.
-
B. Nazer and M. Gastpar, "Compute-and-forward: Harnessing interference through structured codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6463-6486, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6463-6486
-
-
Nazer, B.1
Gastpar, M.2
|