-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
2
-
-
0027629488
-
Common randomness in information theory and cryptography. I. Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. I. Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
4
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. Han and S. Verdú, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.1
Verdú, S.2
-
5
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
6
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
8
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Sci. Syst., vol. 22, pp. 265-279, 1981.
-
(1981)
J. Comput. Sci. Syst.
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.2
-
9
-
-
0342670471
-
On the converse to the coding theorem for discrete memoryless channels
-
May
-
S. Arimoto, "On the converse to the coding theorem for discrete memoryless channels," IEEE Trans Inf. Theory, vol. IT-19, no. 3, pp. 357-359, May 1973.
-
(1973)
IEEE Trans Inf. Theory
, vol.IT-19
, Issue.3
, pp. 357-359
-
-
Arimoto, S.1
-
10
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans Inf. Forens. Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans Inf. Forens. Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
11
-
-
84861172829
-
Coding with scrambling, concatenation, HARQ for the AWGN wire-tap channel: A security gap analysis
-
Jun.
-
M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with scrambling, concatenation, HARQ for the AWGN wire-tap channel: A security gap analysis," IEEE Trans Inf. Forens. Security, vol. 7, no. 3, pp. 883-894, Jun. 2012.
-
(2012)
IEEE Trans Inf. Forens. Security
, vol.7
, Issue.3
, pp. 883-894
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
-
12
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
13
-
-
68349116049
-
-
Delft, The Netherlands: Now Publishers
-
Y. Liang, H. V. Poor, and S. Shamai, Information-Theoretic Security, ser. Foundations and Trends in Communications and Information Theory, vol. 5. Delft, The Netherlands: Now Publishers, 2009, no. 1-5.
-
(2009)
Information-Theoretic Security, Ser. Foundations and Trends in Communications and Information Theory
, vol.5
, Issue.1-5
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
15
-
-
0005059185
-
The strong secret key rate of discrete random triples
-
Norwell, MA, USA: Kluwer
-
U. Maurer, "The strong secret key rate of discrete random triples," in Communications and Cryptography: Two Sides of One Tapestry. Norwell, MA, USA: Kluwer, 1994, pp. 271-285.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.1
-
16
-
-
84865478919
-
Semantic security for the wiretap channel
-
R. Safavi-Naini and R. Canetti, Eds. Berlin, Germany: Springer-Verlag
-
M. Bellare, S. Tessaro, and A. Vardy, "Semantic security for the wiretap channel," in Advances in Cryptology-CRYPTO 2012, vol. 7417, R. Safavi-Naini and R. Canetti, Eds. Berlin, Germany: Springer-Verlag, 2012, pp. 294-311.
-
(2012)
Advances in Cryptology-CRYPTO 2012
, vol.7417
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
17
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
18
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
Sep.
-
R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
-
19
-
-
51649118624
-
An algorithm for computing the secrecy capacity of broadcast channels with confidential messages
-
Nice, France
-
K. Yasui, T. Suko, and T. Matsushima, "An algorithm for computing the secrecy capacity of broadcast channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, 2007, pp. 936-940.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 936-940
-
-
Yasui, K.1
Suko, T.2
Matsushima, T.3
-
20
-
-
52349106587
-
Computation of secrecy capacity for more-capable channel pairs
-
Toronto, ON, Canada
-
K. R. Gowtham and A. Thangaraj, "Computation of secrecy capacity for more-capable channel pairs," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, 2008, pp. 529-533.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 529-533
-
-
Gowtham, K.R.1
Thangaraj, A.2
-
23
-
-
67650099990
-
Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels
-
Jul.
-
E. Arikan, "Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels," IEEE Trans Inf. Theory, vol. 55, no. 7, pp. 3051-3073, Jul. 2009.
-
(2009)
IEEE Trans Inf. Theory
, vol.55
, Issue.7
, pp. 3051-3073
-
-
Arikan, E.1
-
25
-
-
77952682688
-
Capacity-approaching protograph codes
-
Aug.
-
D. Divsalar, S. Dolinar, C. Jones, and K. Andrews, "Capacity-approaching protograph codes," IEEE J. Sel. Areas Commun., vol. 27, no. 6, pp. 876-888, Aug. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.6
, pp. 876-888
-
-
Divsalar, D.1
Dolinar, S.2
Jones, C.3
Andrews, K.4
-
26
-
-
84890353196
-
Deterministic constructions for large girth protograph LDPC codes
-
Istanbul, Turkey, Jul.
-
A. Pradhan, A. Subramanian, and A. Thangaraj, "Deterministic constructions for large girth protograph LDPC codes," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul. 2013, pp. 1680-1684.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1680-1684
-
-
Pradhan, A.1
Subramanian, A.2
Thangaraj, A.3
-
27
-
-
12544253129
-
Regular and irregular progressive edge-growth tanner graphs
-
Jan.
-
X.-Y. Hu, E. Eleftheriou, and D. Arnold, "Regular and irregular progressive edge-growth Tanner graphs," IEEE Trans Inf. Theory, vol. 51, no. 1, pp. 386-398, Jan. 2005.
-
(2005)
IEEE Trans Inf. Theory
, vol.51
, Issue.1
, pp. 386-398
-
-
Hu, X.-Y.1
Eleftheriou, E.2
Arnold, D.3
-
28
-
-
33846590419
-
Low-density parity-check (LDPC) codes constructed from protographs
-
Aug.
-
J. Thrope, "Low-density parity-check (LDPC) codes constructed from protographs," INP Progr. Rep., vol. 53, no. 8, pp. 42-154, Aug. 2005.
-
(2005)
INP Progr. Rep.
, vol.53
, Issue.8
, pp. 42-154
-
-
Thrope, J.1
-
29
-
-
34447515759
-
Construction of quasi-cyclic LDPC codes for AWGN and binary erasure channels: A finite field approach
-
Jul.
-
L. Lan et al., "Construction of quasi-cyclic LDPC codes for AWGN and binary erasure channels: A finite field approach," IEEE Trans Inf. Theory, vol. 53, no. 7, pp. 2429-2458, Jul. 2007.
-
(2007)
IEEE Trans Inf. Theory
, vol.53
, Issue.7
, pp. 2429-2458
-
-
Lan, L.1
-
30
-
-
84960167768
-
-
Delft, The Netherlands: Now Publishers
-
S. P. Vadhan, Pseudorandomness, ser. Foundations and Trends in Communications and Information Theory, vol. 7. Delft, The Netherlands: Now Publishers, 2012, no. 1-3.
-
(2012)
Pseudorandomness, Ser. Foundations and Trends in Communications and Information Theory
, vol.7
, Issue.1-3
-
-
Vadhan, S.P.1
-
31
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
32
-
-
79251496645
-
Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC
-
Feb.
-
S. Kudekar, T. Richardson, and R. Urbanke, "Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC," IEEE Trans Inf. Theory, vol. 57, no. 2, pp. 803-834, Feb. 2011.
-
(2011)
IEEE Trans Inf. Theory
, vol.57
, Issue.2
, pp. 803-834
-
-
Kudekar, S.1
Richardson, T.2
Urbanke, R.3
-
33
-
-
34547922334
-
Applications of LDPC codes to the wiretap channels
-
Aug.
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channels," IEEE Trans Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
34
-
-
0021595510
-
Wiretap channel II
-
Dec.
-
L. H. Ozarow and A. D. Wyner, "Wiretap channel II," AT&T Bell Lab. Tech. J., vol. 63, no. 10, pp. 2135-2157, Dec. 1984.
-
(1984)
AT&T Bell Lab. Tech. J.
, vol.63
, Issue.10
, pp. 2135-2157
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
35
-
-
45249114841
-
Secure nested codes for type II wiretap channels
-
Lake Tahoe, CA, USA, Sep.
-
R. Liu, Y. Liang, H. V. Poor, and P. Spasojević, "Secure nested codes for type II wiretap channels," in Proc. IEEE Inf. Theory Workshop, Lake Tahoe, CA, USA, Sep. 2007, pp. 337-342.
-
(2007)
Proc. IEEE Inf. Theory Workshop
, pp. 337-342
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
Spasojević, P.4
-
37
-
-
33750056552
-
Almost independence and secrecy capacity
-
Jan.-Mar.
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Inf. Transm., vol. 32, no. 1, pp. 40-47, Jan.-Mar. 1996.
-
(1996)
Probl. Inf. Transm.
, vol.32
, Issue.1
, pp. 40-47
-
-
Csiszár, I.1
-
38
-
-
12444299059
-
The private classical capacity and quantum capacity of a quantum channel
-
Jan.
-
I. Devetak, "The private classical capacity and quantum capacity of a quantum channel," IEEE Trans Inf. Theory, vol. 51, no. 1, pp. 44-55, Jan. 2005.
-
(2005)
IEEE Trans Inf. Theory
, vol.51
, Issue.1
, pp. 44-55
-
-
Devetak, I.1
-
39
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels
-
Apr.
-
M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels," IEEE Trans Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
-
(2006)
IEEE Trans Inf. Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
40
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Dec.
-
M. R. Bloch and J. N. Laneman, "Strong secrecy from channel resolvability," IEEE Trans Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
-
(2013)
IEEE Trans Inf. Theory
, vol.59
, Issue.12
, pp. 8077-8098
-
-
Bloch, M.R.1
Laneman, J.N.2
-
41
-
-
84906555227
-
Effective secrecy: Reliability, confusion and stealth
-
Honolulu, HI, USA, Jul.
-
J. Hou and G. Kramer, "Effective secrecy: Reliability, confusion and stealth," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jul. 2014, pp. 601-604.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 601-604
-
-
Hou, J.1
Kramer, G.2
-
42
-
-
84908252542
-
Reliability and secrecy functions of the wiretap channel under cost constraint
-
Nov.
-
T. S. Han, H. Endo, and M. Sasaki, "Reliability and secrecy functions of the wiretap channel under cost constraint," IEEE Trans Inf. Theory, vol. 60, no. 11, pp. 6819-6843, Nov. 2014.
-
(2014)
IEEE Trans Inf. Theory
, vol.60
, Issue.11
, pp. 6819-6843
-
-
Han, T.S.1
Endo, H.2
Sasaki, M.3
-
43
-
-
0016485894
-
The common information of two dependent random variables
-
Mar.
-
A. Wyner, "The common information of two dependent random variables," IEEE Trans Inf. Theory, vol. IT-21, no. 2, pp. 163-179, Mar. 1975.
-
(1975)
IEEE Trans Inf. Theory
, vol.IT-21
, Issue.2
, pp. 163-179
-
-
Wyner, A.1
-
44
-
-
84886646972
-
Distributed channel synthesis
-
Nov.
-
P. Cuff, "Distributed channel synthesis," IEEE Trans Inf. Theory, vol. 59, no. 11, pp. 7071-7096, Nov. 2013.
-
(2013)
IEEE Trans Inf. Theory
, vol.59
, Issue.11
, pp. 7071-7096
-
-
Cuff, P.1
-
45
-
-
77955673446
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Austin, TX, USA, Jun.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, USA, Jun. 2010, pp. 913-917.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 913-917
-
-
Mahdavifar, H.1
Vardy, A.2
-
47
-
-
78751480777
-
Polar coding for secure transmission and key agreement
-
Indoor Mobile Radio Commun., Istambul, Turkey, Sep.
-
O. O. Koyluoglu and H. E. Gamal, "Polar coding for secure transmission and key agreement," in Proc. IEEE Int. Symp. Pers. Indoor Mobile Radio Commun., Istambul, Turkey, Sep. 2010, pp. 2698-2703.
-
(2010)
Proc. IEEE Int. Symp. Pers.
, pp. 2698-2703
-
-
Koyluoglu, O.O.1
Gamal, H.E.2
-
48
-
-
77955596749
-
Nested polar codes for wiretap and relay channels
-
Jun.
-
M. Andersson, V. Rathi, R. Thobaben, J. Kliewer, and M. Skoglund, "Nested polar codes for wiretap and relay channels," IEEE Commun. Lett., vol. 14, no. 4, pp. 752-754, Jun. 2010.
-
(2010)
IEEE Commun. Lett.
, vol.14
, Issue.4
, pp. 752-754
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
49
-
-
77953825394
-
Two edge type LDPC codes for the wiretap channel
-
Monticello, IL, USA
-
V. Rathi, M. Andersson, R. Thobaben, J. Kliewer, and M. Skoglund, "Two edge type LDPC codes for the wiretap channel," in Proc. 43rd Asilomar Conf. Signals Syst. Comput., Monticello, IL, USA, 2009, pp. 834-838.
-
(2009)
Proc. 43rd Asilomar Conf. Signals Syst. Comput.
, pp. 834-838
-
-
Rathi, V.1
Andersson, M.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
50
-
-
79958014300
-
Equivocation of Eve using two edge type LDPC codes for the binary erasure wiretap channel
-
M. Andersson, V. Rathi, R. Thobaben, J. Kliewer, and M. A. Skoglund, "Equivocation of Eve using two edge type LDPC codes for the binary erasure wiretap channel," in Proc. 44th Asilomar Conf. Signals Syst. Comput., 2010, pp. 2045-2049.
-
(2010)
Proc. 44th Asilomar Conf. Signals Syst. Comput.
, pp. 2045-2049
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.A.5
-
51
-
-
84873157260
-
LDPC-based coded cooperative jamming codes
-
Lausanne, Switzerland, Sep.
-
A. J. Pierrot and M. R. Bloch, "LDPC-based coded cooperative jamming codes," in Proc. IEEE Inf. Theory Workshop, Lausanne, Switzerland, Sep. 2012, pp. 462-466.
-
(2012)
Proc. IEEE Inf. Theory Workshop
, pp. 462-466
-
-
Pierrot, A.J.1
Bloch, M.R.2
-
52
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
53
-
-
81255188964
-
Noisy channel coding via privacy amplification and information reconciliation
-
Nov.
-
J. Renes and R. Renner, "Noisy channel coding via privacy amplification and information reconciliation," IEEE Trans Inf. Theory, vol. 57, no. 11, pp. 7377-7385, Nov. 2011.
-
(2011)
IEEE Trans Inf. Theory
, vol.57
, Issue.11
, pp. 7377-7385
-
-
Renes, J.1
Renner, R.2
-
54
-
-
84867560398
-
Achievability proof via output statistics of random binning
-
Boston, MA, USA, Jul.
-
M. H. Yassaee, M. R. Aref, and A. Gohari, "Achievability proof via output statistics of random binning," in Proc. IEEE Int. Symp. Inf. Theory, Boston, MA, USA, Jul. 2012, pp. 1044-1048.
-
(2012)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1044-1048
-
-
Yassaee, M.H.1
Aref, M.R.2
Gohari, A.3
-
55
-
-
0015648934
-
Noiseless coding of correlated information sources
-
Jul.
-
D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans Inf. Theory, vol. IT-19, no. 4, pp. 471-480, Jul. 1973.
-
(1973)
IEEE Trans Inf. Theory
, vol.IT-19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
57
-
-
80051953037
-
Strong secrecy for erasure wiretap channels
-
Dublin, Ireland, Sep.
-
A. T. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, "Strong secrecy for erasure wiretap channels," in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Sep. 2010.
-
(2010)
Proc. IEEE Inf. Theory Workshop
-
-
Suresh, A.T.1
Subramanian, A.2
Thangaraj, A.3
Bloch, M.4
McLaughlin, S.5
-
58
-
-
15044364240
-
Stopping set distribution of LDPC code ensembles
-
Mar.
-
A. Orlitsky, K. Viswanathan, and J. Zhang, "Stopping set distribution of LDPC code ensembles," IEEE Trans Inf. Theory, vol. 51, no. 3, pp. 929-953, Mar. 2005.
-
(2005)
IEEE Trans Inf. Theory
, vol.51
, Issue.3
, pp. 929-953
-
-
Orlitsky, A.1
Viswanathan, K.2
Zhang, J.3
-
59
-
-
80051775152
-
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
-
Sep.
-
A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," IEEE Trans Inf. Forens. Security, vol. 6, no. 3, pp. 585-594, Sep. 2011.
-
(2011)
IEEE Trans Inf. Forens. Security
, vol.6
, Issue.3
, pp. 585-594
-
-
Subramanian, A.1
Thangaraj, A.2
Bloch, M.3
McLaughlin, S.4
-
60
-
-
84890376719
-
A new polar coding scheme for strong security on wiretap channels
-
Istanbul, Turkey
-
E. Sasoglu and A. Vardy, "A new polar coding scheme for strong security on wiretap channels," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, 2013, pp. 1117-1121.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1117-1121
-
-
Sasoglu, E.1
Vardy, A.2
-
61
-
-
84875715192
-
Strong coordination with polar codes
-
Monticello, IL, USA, Oct.
-
M. R. Bloch, L. Luzzi, and J. Kliewer, "Strong coordination with polar codes," in Proc. 50th Allerton Conf. Commun. Control Comput., Monticello, IL, USA, Oct. 2012, pp. 565-571.
-
(2012)
Proc. 50th Allerton Conf. Commun. Control Comput.
, pp. 565-571
-
-
Bloch, M.R.1
Luzzi, L.2
Kliewer, J.3
-
62
-
-
84884358218
-
How to construct polar codes
-
Oct.
-
I. Tal and A. Vardy, "How to construct polar codes," IEEE Trans Inf. Theory, vol. 59, no. 10, pp. 6562-6582, Oct. 2013.
-
(2013)
IEEE Trans Inf. Theory
, vol.59
, Issue.10
, pp. 6562-6582
-
-
Tal, I.1
Vardy, A.2
-
64
-
-
1442337635
-
Reconciliation of a quantum-distributed Gaussian key
-
Feb.
-
G. Van Assche, J. Cardinal, and N. J. Cerf, "Reconciliation of a quantum-distributed Gaussian key," IEEE Trans Inf. Theory, vol. 50, no. 2, pp. 394-400, Feb. 2004.
-
(2004)
IEEE Trans Inf. Theory
, vol.50
, Issue.2
, pp. 394-400
-
-
Van Assche, G.1
Cardinal, J.2
Cerf, N.J.3
-
66
-
-
84890405684
-
Channel upgrading for semantically-secure encryption on wiretap channels
-
Istanbul, Turkey
-
I. Tal and A. Vardy, "Channel upgrading for semantically-secure encryption on wiretap channels," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, 2013, pp. 1561-1565.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1561-1565
-
-
Tal, I.1
Vardy, A.2
-
67
-
-
79957636296
-
Exponential decreasing rate of leaked information in universal random privacy amplification
-
Jun.
-
M. Hayashi, "Exponential decreasing rate of leaked information in universal random privacy amplification," IEEE Trans Inf. Theory, vol. 57, no. 6, pp. 3989-4001, Jun. 2011.
-
(2011)
IEEE Trans Inf. Theory
, vol.57
, Issue.6
, pp. 3989-4001
-
-
Hayashi, M.1
-
68
-
-
84889581480
-
Secure multiplex coding attaining channel capacity in wiretap channels
-
Dec.
-
D. Kobayashi, H. Yamamoto, and T. Ogawa, "Secure multiplex coding attaining channel capacity in wiretap channels," IEEE Trans Inf. Theory, vol. 59, no. 12, pp. 8131-8143, Dec. 2013.
-
(2013)
IEEE Trans Inf. Theory
, vol.59
, Issue.12
, pp. 8131-8143
-
-
Kobayashi, D.1
Yamamoto, H.2
Ogawa, T.3
-
70
-
-
84960167769
-
Polar coding for the broadcast channel with confidential messages and constrained randomization
-
Oct. [Online]
-
R. A. Chou and M. R. Bloch, "Polar coding for the broadcast channel with confidential messages and constrained randomization," IEEE Trans Inf. Theory, Oct. 2014. [Online]. Available: http://arxiv.org/abs/1411.0281.
-
(2014)
IEEE Trans Inf. Theory
-
-
Chou, R.A.1
Bloch, M.R.2
-
71
-
-
76249114344
-
Construction of wiretap channel codes by using sparse matrices
-
Taormina, Sicily, Oct.
-
J. Muramatsu and S. Miyake, "Construction of wiretap channel codes by using sparse matrices," in Proc. IEEE Inf. Theory Workshop, Taormina, Sicily, Oct. 2009, pp. 105-109.
-
(2009)
Proc. IEEE Inf. Theory Workshop
, pp. 105-109
-
-
Muramatsu, J.1
Miyake, S.2
-
72
-
-
84899643286
-
Channel coding and lossy source coding using a generator of constrained random numbers
-
May
-
J. Muramatsu, "Channel coding and lossy source coding using a generator of constrained random numbers," IEEE Trans Inf. Theory, vol. 60, no. 5, pp. 2667-2686, May 2014.
-
(2014)
IEEE Trans Inf. Theory
, vol.60
, Issue.5
, pp. 2667-2686
-
-
Muramatsu, J.1
-
73
-
-
77955691090
-
Source polarization
-
Austin, TX, USA
-
E. Arikan, "Source polarization," in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, USA, 2010, pp. 899-903.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 899-903
-
-
Arikan, E.1
-
75
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
76
-
-
80054809611
-
Secrecy when the eavesdropper controls its channel states
-
Saint Petersburg, Russia
-
X. He and A. Yener, "Secrecy when the eavesdropper controls its channel states," in Proc. IEEE Int. Symp. Inf. Theory, Saint Petersburg, Russia, 2011, pp. 618-622.
-
(2011)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 618-622
-
-
He, X.1
Yener, A.2
-
77
-
-
80051727482
-
Strongly secure communications over the two-way wiretap channel
-
Sep.
-
A. J. Pierrot and M. R. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans Inf. Forens. Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
-
(2011)
IEEE Trans Inf. Forens. Security
, vol.6
, Issue.3
, pp. 595-605
-
-
Pierrot, A.J.1
Bloch, M.R.2
-
78
-
-
79551637444
-
Providing secrecy irrespective of Eavesdropper's channel state
-
Miami, FL, USA
-
X. He and A. Yener, "Providing secrecy irrespective of eavesdropper's channel state," in Proc. IEEE Global Telecommun. Conf., Miami, FL, USA, 2010.
-
(2010)
Proc. IEEE Global Telecommun. Conf.
-
-
He, X.1
Yener, A.2
-
79
-
-
79952383608
-
Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas
-
Monticello, IL, USA
-
X. He and A. Yener, "Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas," in Proc. 48th Annu. Allerton Conf. Commun. Control Comput., Monticello, IL, USA, 2010, pp. 1228-1235.
-
(2010)
Proc. 48th Annu. Allerton Conf. Commun. Control Comput.
, pp. 1228-1235
-
-
He, X.1
Yener, A.2
-
80
-
-
84908245996
-
MIMO wiretap channels with unknown and varying eavesdropper channel states
-
Nov.
-
X. He and A. Yener, "MIMO wiretap channels with unknown and varying eavesdropper channel states," IEEE Trans Inf. Theory, vol. 60, no. 11, pp. 6844-6869, Nov. 2014.
-
(2014)
IEEE Trans Inf. Theory
, vol.60
, Issue.11
, pp. 6844-6869
-
-
He, X.1
Yener, A.2
-
81
-
-
84867563277
-
Polar codes for discrete alphabets
-
Cambridge, MA, USA
-
E. yazoʇlu, "Polar codes for discrete alphabets," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, 2012, pp. 2137-2141.
-
(2012)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2137-2141
-
-
Yazoʇlu, E.1
-
83
-
-
13444270764
-
Folklore in source coding: Information-spectrum approach
-
Feb.
-
T. S. Han, "Folklore in source coding: Information-spectrum approach," IEEE Trans Inf. Theory, vol. 51, no. 2, pp. 747-753, Feb. 2005.
-
(2005)
IEEE Trans Inf. Theory
, vol.51
, Issue.2
, pp. 747-753
-
-
Han, T.S.1
-
84
-
-
54749144274
-
Second-order asymptotics in fixed-length source coding and intrinsic randomness
-
Oct.
-
M. Hayashi, "Second-order asymptotics in fixed-length source coding and intrinsic randomness," IEEE Trans Inf. Theory, vol. 54, no. 10, pp. 4619-4637, Oct. 2008.
-
(2008)
IEEE Trans Inf. Theory
, vol.54
, Issue.10
, pp. 4619-4637
-
-
Hayashi, M.1
-
85
-
-
84867560400
-
On secure communication with constrained randomization
-
Cambridge, MA, USA, Jul.
-
M. R. Bloch and J. Kliewer, "On secure communication with constrained randomization," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 1172-1176.
-
(2012)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1172-1176
-
-
Bloch, M.R.1
Kliewer, J.2
-
86
-
-
84912142747
-
Best binary equivocation code construction for syndrome coding
-
Jul.
-
K. Zhang, M. Tomlinson, M. Ahmed, M. Ambroze, and M. Rodrigues, "Best binary equivocation code construction for syndrome coding," IET Commun., vol. 8, no. 10, pp. 1696-1704, Jul. 2014.
-
(2014)
IET Commun.
, vol.8
, Issue.10
, pp. 1696-1704
-
-
Zhang, K.1
Tomlinson, M.2
Ahmed, M.3
Ambroze, M.4
Rodrigues, M.5
-
87
-
-
84906544554
-
Strong converse and second-order asymptotics of channel resolvability
-
Honolulu, HI, USA
-
S. Watanabe and M. Hayashi, "Strong converse and second-order asymptotics of channel resolvability," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, 2014, pp. 1882-1886.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1882-1886
-
-
Watanabe, S.1
Hayashi, M.2
|