메뉴 건너뛰기




Volumn 103, Issue 10, 2015, Pages 1725-1746

Error-Control Coding for Physical-Layer Secrecy

Author keywords

Channel resolvability; error control coding; physical layer security; privacy amplification

Indexed keywords

ERRORS; NETWORK LAYERS; RANDOM PROCESSES; STOCHASTIC SYSTEMS;

EID: 84960154985     PISSN: 00189219     EISSN: 15582256     Source Type: Journal    
DOI: 10.1109/JPROC.2015.2463678     Document Type: Article
Times cited : (108)

References (87)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 2
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. I. Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. I. Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 4
    • 0027602480 scopus 로고
    • Approximation theory of output statistics
    • May
    • T. Han and S. Verdú, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 752-772
    • Han, T.1    Verdú, S.2
  • 6
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1948.
    • (1948) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 8
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Sci. Syst., vol. 22, pp. 265-279, 1981.
    • (1981) J. Comput. Sci. Syst. , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.2
  • 9
    • 0342670471 scopus 로고
    • On the converse to the coding theorem for discrete memoryless channels
    • May
    • S. Arimoto, "On the converse to the coding theorem for discrete memoryless channels," IEEE Trans Inf. Theory, vol. IT-19, no. 3, pp. 357-359, May 1973.
    • (1973) IEEE Trans Inf. Theory , vol.IT-19 , Issue.3 , pp. 357-359
    • Arimoto, S.1
  • 11
    • 84861172829 scopus 로고    scopus 로고
    • Coding with scrambling, concatenation, HARQ for the AWGN wire-tap channel: A security gap analysis
    • Jun.
    • M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with scrambling, concatenation, HARQ for the AWGN wire-tap channel: A security gap analysis," IEEE Trans Inf. Forens. Security, vol. 7, no. 3, pp. 883-894, Jun. 2012.
    • (2012) IEEE Trans Inf. Forens. Security , vol.7 , Issue.3 , pp. 883-894
    • Baldi, M.1    Bianchi, M.2    Chiaraluce, F.3
  • 12
  • 15
    • 0005059185 scopus 로고
    • The strong secret key rate of discrete random triples
    • Norwell, MA, USA: Kluwer
    • U. Maurer, "The strong secret key rate of discrete random triples," in Communications and Cryptography: Two Sides of One Tapestry. Norwell, MA, USA: Kluwer, 1994, pp. 271-285.
    • (1994) Communications and Cryptography: Two Sides of One Tapestry , pp. 271-285
    • Maurer, U.1
  • 16
    • 84865478919 scopus 로고    scopus 로고
    • Semantic security for the wiretap channel
    • R. Safavi-Naini and R. Canetti, Eds. Berlin, Germany: Springer-Verlag
    • M. Bellare, S. Tessaro, and A. Vardy, "Semantic security for the wiretap channel," in Advances in Cryptology-CRYPTO 2012, vol. 7417, R. Safavi-Naini and R. Canetti, Eds. Berlin, Germany: Springer-Verlag, 2012, pp. 294-311.
    • (2012) Advances in Cryptology-CRYPTO 2012 , vol.7417 , pp. 294-311
    • Bellare, M.1    Tessaro, S.2    Vardy, A.3
  • 17
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 18
    • 85032751357 scopus 로고    scopus 로고
    • Cooperative security at the physical layer: A summary of recent advances
    • Sep.
    • R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 16-28
    • Bassily, R.1
  • 19
    • 51649118624 scopus 로고    scopus 로고
    • An algorithm for computing the secrecy capacity of broadcast channels with confidential messages
    • Nice, France
    • K. Yasui, T. Suko, and T. Matsushima, "An algorithm for computing the secrecy capacity of broadcast channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, 2007, pp. 936-940.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 936-940
    • Yasui, K.1    Suko, T.2    Matsushima, T.3
  • 20
    • 52349106587 scopus 로고    scopus 로고
    • Computation of secrecy capacity for more-capable channel pairs
    • Toronto, ON, Canada
    • K. R. Gowtham and A. Thangaraj, "Computation of secrecy capacity for more-capable channel pairs," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, 2008, pp. 529-533.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory , pp. 529-533
    • Gowtham, K.R.1    Thangaraj, A.2
  • 23
    • 67650099990 scopus 로고    scopus 로고
    • Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels
    • Jul.
    • E. Arikan, "Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels," IEEE Trans Inf. Theory, vol. 55, no. 7, pp. 3051-3073, Jul. 2009.
    • (2009) IEEE Trans Inf. Theory , vol.55 , Issue.7 , pp. 3051-3073
    • Arikan, E.1
  • 26
    • 84890353196 scopus 로고    scopus 로고
    • Deterministic constructions for large girth protograph LDPC codes
    • Istanbul, Turkey, Jul.
    • A. Pradhan, A. Subramanian, and A. Thangaraj, "Deterministic constructions for large girth protograph LDPC codes," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul. 2013, pp. 1680-1684.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory , pp. 1680-1684
    • Pradhan, A.1    Subramanian, A.2    Thangaraj, A.3
  • 27
    • 12544253129 scopus 로고    scopus 로고
    • Regular and irregular progressive edge-growth tanner graphs
    • Jan.
    • X.-Y. Hu, E. Eleftheriou, and D. Arnold, "Regular and irregular progressive edge-growth Tanner graphs," IEEE Trans Inf. Theory, vol. 51, no. 1, pp. 386-398, Jan. 2005.
    • (2005) IEEE Trans Inf. Theory , vol.51 , Issue.1 , pp. 386-398
    • Hu, X.-Y.1    Eleftheriou, E.2    Arnold, D.3
  • 28
    • 33846590419 scopus 로고    scopus 로고
    • Low-density parity-check (LDPC) codes constructed from protographs
    • Aug.
    • J. Thrope, "Low-density parity-check (LDPC) codes constructed from protographs," INP Progr. Rep., vol. 53, no. 8, pp. 42-154, Aug. 2005.
    • (2005) INP Progr. Rep. , vol.53 , Issue.8 , pp. 42-154
    • Thrope, J.1
  • 29
    • 34447515759 scopus 로고    scopus 로고
    • Construction of quasi-cyclic LDPC codes for AWGN and binary erasure channels: A finite field approach
    • Jul.
    • L. Lan et al., "Construction of quasi-cyclic LDPC codes for AWGN and binary erasure channels: A finite field approach," IEEE Trans Inf. Theory, vol. 53, no. 7, pp. 2429-2458, Jul. 2007.
    • (2007) IEEE Trans Inf. Theory , vol.53 , Issue.7 , pp. 2429-2458
    • Lan, L.1
  • 31
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 32
    • 79251496645 scopus 로고    scopus 로고
    • Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC
    • Feb.
    • S. Kudekar, T. Richardson, and R. Urbanke, "Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC," IEEE Trans Inf. Theory, vol. 57, no. 2, pp. 803-834, Feb. 2011.
    • (2011) IEEE Trans Inf. Theory , vol.57 , Issue.2 , pp. 803-834
    • Kudekar, S.1    Richardson, T.2    Urbanke, R.3
  • 34
    • 0021595510 scopus 로고
    • Wiretap channel II
    • Dec.
    • L. H. Ozarow and A. D. Wyner, "Wiretap channel II," AT&T Bell Lab. Tech. J., vol. 63, no. 10, pp. 2135-2157, Dec. 1984.
    • (1984) AT&T Bell Lab. Tech. J. , vol.63 , Issue.10 , pp. 2135-2157
    • Ozarow, L.H.1    Wyner, A.D.2
  • 35
    • 45249114841 scopus 로고    scopus 로고
    • Secure nested codes for type II wiretap channels
    • Lake Tahoe, CA, USA, Sep.
    • R. Liu, Y. Liang, H. V. Poor, and P. Spasojević, "Secure nested codes for type II wiretap channels," in Proc. IEEE Inf. Theory Workshop, Lake Tahoe, CA, USA, Sep. 2007, pp. 337-342.
    • (2007) Proc. IEEE Inf. Theory Workshop , pp. 337-342
    • Liu, R.1    Liang, Y.2    Poor, H.V.3    Spasojević, P.4
  • 37
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • Jan.-Mar.
    • I. Csiszár, "Almost independence and secrecy capacity," Probl. Inf. Transm., vol. 32, no. 1, pp. 40-47, Jan.-Mar. 1996.
    • (1996) Probl. Inf. Transm. , vol.32 , Issue.1 , pp. 40-47
    • Csiszár, I.1
  • 38
    • 12444299059 scopus 로고    scopus 로고
    • The private classical capacity and quantum capacity of a quantum channel
    • Jan.
    • I. Devetak, "The private classical capacity and quantum capacity of a quantum channel," IEEE Trans Inf. Theory, vol. 51, no. 1, pp. 44-55, Jan. 2005.
    • (2005) IEEE Trans Inf. Theory , vol.51 , Issue.1 , pp. 44-55
    • Devetak, I.1
  • 39
    • 33645727315 scopus 로고    scopus 로고
    • General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels
    • Apr.
    • M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels," IEEE Trans Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
    • (2006) IEEE Trans Inf. Theory , vol.52 , Issue.4 , pp. 1562-1575
    • Hayashi, M.1
  • 40
    • 84889587094 scopus 로고    scopus 로고
    • Strong secrecy from channel resolvability
    • Dec.
    • M. R. Bloch and J. N. Laneman, "Strong secrecy from channel resolvability," IEEE Trans Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
    • (2013) IEEE Trans Inf. Theory , vol.59 , Issue.12 , pp. 8077-8098
    • Bloch, M.R.1    Laneman, J.N.2
  • 41
    • 84906555227 scopus 로고    scopus 로고
    • Effective secrecy: Reliability, confusion and stealth
    • Honolulu, HI, USA, Jul.
    • J. Hou and G. Kramer, "Effective secrecy: Reliability, confusion and stealth," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jul. 2014, pp. 601-604.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory , pp. 601-604
    • Hou, J.1    Kramer, G.2
  • 42
    • 84908252542 scopus 로고    scopus 로고
    • Reliability and secrecy functions of the wiretap channel under cost constraint
    • Nov.
    • T. S. Han, H. Endo, and M. Sasaki, "Reliability and secrecy functions of the wiretap channel under cost constraint," IEEE Trans Inf. Theory, vol. 60, no. 11, pp. 6819-6843, Nov. 2014.
    • (2014) IEEE Trans Inf. Theory , vol.60 , Issue.11 , pp. 6819-6843
    • Han, T.S.1    Endo, H.2    Sasaki, M.3
  • 43
    • 0016485894 scopus 로고
    • The common information of two dependent random variables
    • Mar.
    • A. Wyner, "The common information of two dependent random variables," IEEE Trans Inf. Theory, vol. IT-21, no. 2, pp. 163-179, Mar. 1975.
    • (1975) IEEE Trans Inf. Theory , vol.IT-21 , Issue.2 , pp. 163-179
    • Wyner, A.1
  • 44
    • 84886646972 scopus 로고    scopus 로고
    • Distributed channel synthesis
    • Nov.
    • P. Cuff, "Distributed channel synthesis," IEEE Trans Inf. Theory, vol. 59, no. 11, pp. 7071-7096, Nov. 2013.
    • (2013) IEEE Trans Inf. Theory , vol.59 , Issue.11 , pp. 7071-7096
    • Cuff, P.1
  • 45
    • 77955673446 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Austin, TX, USA, Jun.
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, USA, Jun. 2010, pp. 913-917.
    • (2010) Proc. IEEE Int. Symp. Inf. Theory , pp. 913-917
    • Mahdavifar, H.1    Vardy, A.2
  • 46
  • 47
    • 78751480777 scopus 로고    scopus 로고
    • Polar coding for secure transmission and key agreement
    • Indoor Mobile Radio Commun., Istambul, Turkey, Sep.
    • O. O. Koyluoglu and H. E. Gamal, "Polar coding for secure transmission and key agreement," in Proc. IEEE Int. Symp. Pers. Indoor Mobile Radio Commun., Istambul, Turkey, Sep. 2010, pp. 2698-2703.
    • (2010) Proc. IEEE Int. Symp. Pers. , pp. 2698-2703
    • Koyluoglu, O.O.1    Gamal, H.E.2
  • 51
    • 84873157260 scopus 로고    scopus 로고
    • LDPC-based coded cooperative jamming codes
    • Lausanne, Switzerland, Sep.
    • A. J. Pierrot and M. R. Bloch, "LDPC-based coded cooperative jamming codes," in Proc. IEEE Inf. Theory Workshop, Lausanne, Switzerland, Sep. 2012, pp. 462-466.
    • (2012) Proc. IEEE Inf. Theory Workshop , pp. 462-466
    • Pierrot, A.J.1    Bloch, M.R.2
  • 52
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Oct.
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
    • (2011) IEEE Trans Inf. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 53
    • 81255188964 scopus 로고    scopus 로고
    • Noisy channel coding via privacy amplification and information reconciliation
    • Nov.
    • J. Renes and R. Renner, "Noisy channel coding via privacy amplification and information reconciliation," IEEE Trans Inf. Theory, vol. 57, no. 11, pp. 7377-7385, Nov. 2011.
    • (2011) IEEE Trans Inf. Theory , vol.57 , Issue.11 , pp. 7377-7385
    • Renes, J.1    Renner, R.2
  • 54
    • 84867560398 scopus 로고    scopus 로고
    • Achievability proof via output statistics of random binning
    • Boston, MA, USA, Jul.
    • M. H. Yassaee, M. R. Aref, and A. Gohari, "Achievability proof via output statistics of random binning," in Proc. IEEE Int. Symp. Inf. Theory, Boston, MA, USA, Jul. 2012, pp. 1044-1048.
    • (2012) Proc. IEEE Int. Symp. Inf. Theory , pp. 1044-1048
    • Yassaee, M.H.1    Aref, M.R.2    Gohari, A.3
  • 55
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • Jul.
    • D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans Inf. Theory, vol. IT-19, no. 4, pp. 471-480, Jul. 1973.
    • (1973) IEEE Trans Inf. Theory , vol.IT-19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 58
    • 15044364240 scopus 로고    scopus 로고
    • Stopping set distribution of LDPC code ensembles
    • Mar.
    • A. Orlitsky, K. Viswanathan, and J. Zhang, "Stopping set distribution of LDPC code ensembles," IEEE Trans Inf. Theory, vol. 51, no. 3, pp. 929-953, Mar. 2005.
    • (2005) IEEE Trans Inf. Theory , vol.51 , Issue.3 , pp. 929-953
    • Orlitsky, A.1    Viswanathan, K.2    Zhang, J.3
  • 59
    • 80051775152 scopus 로고    scopus 로고
    • Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
    • Sep.
    • A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," IEEE Trans Inf. Forens. Security, vol. 6, no. 3, pp. 585-594, Sep. 2011.
    • (2011) IEEE Trans Inf. Forens. Security , vol.6 , Issue.3 , pp. 585-594
    • Subramanian, A.1    Thangaraj, A.2    Bloch, M.3    McLaughlin, S.4
  • 60
    • 84890376719 scopus 로고    scopus 로고
    • A new polar coding scheme for strong security on wiretap channels
    • Istanbul, Turkey
    • E. Sasoglu and A. Vardy, "A new polar coding scheme for strong security on wiretap channels," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, 2013, pp. 1117-1121.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory , pp. 1117-1121
    • Sasoglu, E.1    Vardy, A.2
  • 62
    • 84884358218 scopus 로고    scopus 로고
    • How to construct polar codes
    • Oct.
    • I. Tal and A. Vardy, "How to construct polar codes," IEEE Trans Inf. Theory, vol. 59, no. 10, pp. 6562-6582, Oct. 2013.
    • (2013) IEEE Trans Inf. Theory , vol.59 , Issue.10 , pp. 6562-6582
    • Tal, I.1    Vardy, A.2
  • 64
    • 1442337635 scopus 로고    scopus 로고
    • Reconciliation of a quantum-distributed Gaussian key
    • Feb.
    • G. Van Assche, J. Cardinal, and N. J. Cerf, "Reconciliation of a quantum-distributed Gaussian key," IEEE Trans Inf. Theory, vol. 50, no. 2, pp. 394-400, Feb. 2004.
    • (2004) IEEE Trans Inf. Theory , vol.50 , Issue.2 , pp. 394-400
    • Van Assche, G.1    Cardinal, J.2    Cerf, N.J.3
  • 66
    • 84890405684 scopus 로고    scopus 로고
    • Channel upgrading for semantically-secure encryption on wiretap channels
    • Istanbul, Turkey
    • I. Tal and A. Vardy, "Channel upgrading for semantically-secure encryption on wiretap channels," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, 2013, pp. 1561-1565.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory , pp. 1561-1565
    • Tal, I.1    Vardy, A.2
  • 67
    • 79957636296 scopus 로고    scopus 로고
    • Exponential decreasing rate of leaked information in universal random privacy amplification
    • Jun.
    • M. Hayashi, "Exponential decreasing rate of leaked information in universal random privacy amplification," IEEE Trans Inf. Theory, vol. 57, no. 6, pp. 3989-4001, Jun. 2011.
    • (2011) IEEE Trans Inf. Theory , vol.57 , Issue.6 , pp. 3989-4001
    • Hayashi, M.1
  • 68
    • 84889581480 scopus 로고    scopus 로고
    • Secure multiplex coding attaining channel capacity in wiretap channels
    • Dec.
    • D. Kobayashi, H. Yamamoto, and T. Ogawa, "Secure multiplex coding attaining channel capacity in wiretap channels," IEEE Trans Inf. Theory, vol. 59, no. 12, pp. 8131-8143, Dec. 2013.
    • (2013) IEEE Trans Inf. Theory , vol.59 , Issue.12 , pp. 8131-8143
    • Kobayashi, D.1    Yamamoto, H.2    Ogawa, T.3
  • 70
    • 84960167769 scopus 로고    scopus 로고
    • Polar coding for the broadcast channel with confidential messages and constrained randomization
    • Oct. [Online]
    • R. A. Chou and M. R. Bloch, "Polar coding for the broadcast channel with confidential messages and constrained randomization," IEEE Trans Inf. Theory, Oct. 2014. [Online]. Available: http://arxiv.org/abs/1411.0281.
    • (2014) IEEE Trans Inf. Theory
    • Chou, R.A.1    Bloch, M.R.2
  • 71
    • 76249114344 scopus 로고    scopus 로고
    • Construction of wiretap channel codes by using sparse matrices
    • Taormina, Sicily, Oct.
    • J. Muramatsu and S. Miyake, "Construction of wiretap channel codes by using sparse matrices," in Proc. IEEE Inf. Theory Workshop, Taormina, Sicily, Oct. 2009, pp. 105-109.
    • (2009) Proc. IEEE Inf. Theory Workshop , pp. 105-109
    • Muramatsu, J.1    Miyake, S.2
  • 72
    • 84899643286 scopus 로고    scopus 로고
    • Channel coding and lossy source coding using a generator of constrained random numbers
    • May
    • J. Muramatsu, "Channel coding and lossy source coding using a generator of constrained random numbers," IEEE Trans Inf. Theory, vol. 60, no. 5, pp. 2667-2686, May 2014.
    • (2014) IEEE Trans Inf. Theory , vol.60 , Issue.5 , pp. 2667-2686
    • Muramatsu, J.1
  • 73
    • 77955691090 scopus 로고    scopus 로고
    • Source polarization
    • Austin, TX, USA
    • E. Arikan, "Source polarization," in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, USA, 2010, pp. 899-903.
    • (2010) Proc. IEEE Int. Symp. Inf. Theory , pp. 899-903
    • Arikan, E.1
  • 75
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 76
    • 80054809611 scopus 로고    scopus 로고
    • Secrecy when the eavesdropper controls its channel states
    • Saint Petersburg, Russia
    • X. He and A. Yener, "Secrecy when the eavesdropper controls its channel states," in Proc. IEEE Int. Symp. Inf. Theory, Saint Petersburg, Russia, 2011, pp. 618-622.
    • (2011) Proc. IEEE Int. Symp. Inf. Theory , pp. 618-622
    • He, X.1    Yener, A.2
  • 77
    • 80051727482 scopus 로고    scopus 로고
    • Strongly secure communications over the two-way wiretap channel
    • Sep.
    • A. J. Pierrot and M. R. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans Inf. Forens. Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
    • (2011) IEEE Trans Inf. Forens. Security , vol.6 , Issue.3 , pp. 595-605
    • Pierrot, A.J.1    Bloch, M.R.2
  • 78
    • 79551637444 scopus 로고    scopus 로고
    • Providing secrecy irrespective of Eavesdropper's channel state
    • Miami, FL, USA
    • X. He and A. Yener, "Providing secrecy irrespective of eavesdropper's channel state," in Proc. IEEE Global Telecommun. Conf., Miami, FL, USA, 2010.
    • (2010) Proc. IEEE Global Telecommun. Conf.
    • He, X.1    Yener, A.2
  • 79
    • 79952383608 scopus 로고    scopus 로고
    • Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas
    • Monticello, IL, USA
    • X. He and A. Yener, "Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas," in Proc. 48th Annu. Allerton Conf. Commun. Control Comput., Monticello, IL, USA, 2010, pp. 1228-1235.
    • (2010) Proc. 48th Annu. Allerton Conf. Commun. Control Comput. , pp. 1228-1235
    • He, X.1    Yener, A.2
  • 80
    • 84908245996 scopus 로고    scopus 로고
    • MIMO wiretap channels with unknown and varying eavesdropper channel states
    • Nov.
    • X. He and A. Yener, "MIMO wiretap channels with unknown and varying eavesdropper channel states," IEEE Trans Inf. Theory, vol. 60, no. 11, pp. 6844-6869, Nov. 2014.
    • (2014) IEEE Trans Inf. Theory , vol.60 , Issue.11 , pp. 6844-6869
    • He, X.1    Yener, A.2
  • 81
    • 84867563277 scopus 로고    scopus 로고
    • Polar codes for discrete alphabets
    • Cambridge, MA, USA
    • E. yazoʇlu, "Polar codes for discrete alphabets," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, 2012, pp. 2137-2141.
    • (2012) Proc. IEEE Int. Symp. Inf. Theory , pp. 2137-2141
    • Yazoʇlu, E.1
  • 83
    • 13444270764 scopus 로고    scopus 로고
    • Folklore in source coding: Information-spectrum approach
    • Feb.
    • T. S. Han, "Folklore in source coding: Information-spectrum approach," IEEE Trans Inf. Theory, vol. 51, no. 2, pp. 747-753, Feb. 2005.
    • (2005) IEEE Trans Inf. Theory , vol.51 , Issue.2 , pp. 747-753
    • Han, T.S.1
  • 84
    • 54749144274 scopus 로고    scopus 로고
    • Second-order asymptotics in fixed-length source coding and intrinsic randomness
    • Oct.
    • M. Hayashi, "Second-order asymptotics in fixed-length source coding and intrinsic randomness," IEEE Trans Inf. Theory, vol. 54, no. 10, pp. 4619-4637, Oct. 2008.
    • (2008) IEEE Trans Inf. Theory , vol.54 , Issue.10 , pp. 4619-4637
    • Hayashi, M.1
  • 85
    • 84867560400 scopus 로고    scopus 로고
    • On secure communication with constrained randomization
    • Cambridge, MA, USA, Jul.
    • M. R. Bloch and J. Kliewer, "On secure communication with constrained randomization," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 1172-1176.
    • (2012) Proc. IEEE Int. Symp. Inf. Theory , pp. 1172-1176
    • Bloch, M.R.1    Kliewer, J.2
  • 86
    • 84912142747 scopus 로고    scopus 로고
    • Best binary equivocation code construction for syndrome coding
    • Jul.
    • K. Zhang, M. Tomlinson, M. Ahmed, M. Ambroze, and M. Rodrigues, "Best binary equivocation code construction for syndrome coding," IET Commun., vol. 8, no. 10, pp. 1696-1704, Jul. 2014.
    • (2014) IET Commun. , vol.8 , Issue.10 , pp. 1696-1704
    • Zhang, K.1    Tomlinson, M.2    Ahmed, M.3    Ambroze, M.4    Rodrigues, M.5
  • 87
    • 84906544554 scopus 로고    scopus 로고
    • Strong converse and second-order asymptotics of channel resolvability
    • Honolulu, HI, USA
    • S. Watanabe and M. Hayashi, "Strong converse and second-order asymptotics of channel resolvability," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, 2014, pp. 1882-1886.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory , pp. 1882-1886
    • Watanabe, S.1    Hayashi, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.