-
2
-
-
0347337828
-
Secure space-time communication
-
A. O. Hero, "Secure space-time communication," IEEE Trans. Inform. Theory, vol. 49, no. 12, pp. 3235-3249, 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
3
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
5
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
6
-
-
79952383608
-
Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas
-
X. He and A. Yener, "Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas," in Proc. 48th Annu. Allerton Conf. Commun., Control, and Computing, 2010, pp. 1228-1235.
-
(2010)
Proc. 48th Annu. Allerton Conf. Commun., Control, and Computing
, pp. 1228-1235
-
-
He, X.1
Yener, A.2
-
7
-
-
77949624888
-
Arbitrary jamming can preclude secure communications
-
Sept
-
E. Molavian Jazi, M. R. Bloch, and J. N. Laneman, "Arbitrary jamming can preclude secure communications," in Proc. 47th Annu. Allerton Conf. Commun., Control, and Computing, Sept. 2009, pp. 1069-1075.
-
(2009)
Proc. 47th Annu. Allerton Conf. Commun., Control, and Computing
, pp. 1069-1075
-
-
Molavian Jazi, E.1
Bloch, M.R.2
Laneman, J.N.3
-
8
-
-
84873142993
-
Strong secrecy in arbitrarily varying wiretap channels
-
I. Bjelakovic, H. Boche, and J. Sommerfeld, "Strong secrecy in arbitrarily varying wiretap channels," in Proc. IEEE Information Theory Workshop (ITW), 2012, pp. 617-621.
-
(2012)
Proc. IEEE Information Theory Workshop (ITW)
, pp. 617-621
-
-
Bjelakovic, I.1
Boche, H.2
Sommerfeld, J.3
-
9
-
-
84856860359
-
Invertible extractors and wiretap protocols
-
M. Cheraghchi, F. Didier, and A. Shokrollahi, "Invertible extractors and wiretap protocols," IEEE Trans. Inform. Theory, vol. 58, no. 2, pp. 1254-1274, 2012.
-
(2012)
IEEE Trans. Inform. Theory
, vol.58
, Issue.2
, pp. 1254-1274
-
-
Cheraghchi, M.1
Didier, F.2
Shokrollahi, A.3
-
10
-
-
45249114841
-
Secure nested codes for type II wiretap channels
-
Lake Tahoe, CA, Sept
-
R. Liu, Y. Liang, H. V. Poor, and P. Spasojevic, "Secure nested codes for type II wiretap channels," in Proc. IEEE Inform. Theory Workshop (ITW), Lake Tahoe, CA, Sept. 2007, pp. 337-342.
-
(2007)
Proc. IEEE Inform. Theory Workshop (ITW)
, pp. 337-342
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
Spasojevic, P.4
-
12
-
-
80051727864
-
Coding for cryptographic security enhancement using stopping sets
-
Sept.
-
W. K. Harrison, J. Almeida, S. W. McLaughlin, and J. Barros, "Coding for cryptographic security enhancement using stopping sets," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 3, pp. 575-584, Sept. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Sec
, vol.6
, Issue.3
, pp. 575-584
-
-
Harrison, W.K.1
Almeida, J.2
McLaughlin, S.W.3
Barros, J.4
-
13
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inform. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
14
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J. (before 1984), vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J. (Before 1984)
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
15
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Advances in Cryptology-EUROCRYPT 2000 Bruges, Belgium: Springer-Verlag
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology-EUROCRYPT 2000 (Lecture Notes in Computer Science, vol. 1807), Bruges, Belgium: Springer-Verlag, pp. 351-368.
-
Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
16
-
-
80051953037
-
Strong secrecy for erasure wiretap channels
-
Dublin, Ireland, Aug.-Sept
-
A. T. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, "Strong secrecy for erasure wiretap channels," in Proc. IEEE Inform. Theory Workshop (ITW), Dublin, Ireland, Aug.-Sept. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inform. Theory Workshop (ITW)
, pp. 1-5
-
-
Suresh, A.T.1
Subramanian, A.2
Thangaraj, A.3
Bloch, M.4
McLaughlin, S.W.5
-
17
-
-
84865478919
-
Semantic security for the wiretap channel
-
Advances in Cryptology-CRYPTO 2012 Berlin, Heidelberg, Germany: Springer-Verlag
-
M. Bellare, S. Tessaro, and A. Vardy, "Semantic security for the wiretap channel," in Advances in Cryptology-CRYPTO 2012 (Lecture Notes in Computer Science, vol. 7417). Berlin, Heidelberg, Germany: Springer-Verlag, pp. 294-311.
-
Lecture Notes in Computer Science
, vol.7417
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
18
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sept.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 3, pp. 532-540, Sept. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Sec
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
19
-
-
67650099990
-
Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels
-
July
-
E. Arikan, "Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels," IEEE Trans. Inform. Theory, vol. 55, no. 7, pp. 3051-3073, July 2009.
-
(2009)
IEEE Trans. Inform. Theory
, vol.55
, Issue.7
, pp. 3051-3073
-
-
Arikan, E.1
-
20
-
-
79251496645
-
Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC
-
S. Kudekar, T. J. Richardson, and R. L. Urbanke, "Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC," IEEE Trans. Inform. Theory, vol. 57, no. 2, pp. 803-834, 2011.
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, Issue.2
, pp. 803-834
-
-
Kudekar, S.1
Richardson, T.J.2
Urbanke, R.L.3
-
21
-
-
84872536384
-
Performance analysis and design of two edge-type LDPC codes for the BEC wiretap channel
-
Feb.
-
V. Rathi, M. Andersson, R. Thobaben, J. Kliewer, and M. Skoglund, "Performance analysis and design of two edge-type LDPC codes for the BEC wiretap channel," IEEE Trans. Inform. Theory, vol. 59, no. 2, pp. 1048-1064, Feb. 2013.
-
(2013)
IEEE Trans. Inform. Theory
, vol.59
, Issue.2
, pp. 1048-1064
-
-
Rathi, V.1
Andersson, M.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
22
-
-
80054816671
-
Rate-equivocation optimal spatially coupled LDPC codes for the BEC wiretap channel
-
St. Petersburg, Russia, Aug
-
V. Rathi, R. Urbanke, M. Andersson, and M. Skoglund, "Rate- equivocation optimal spatially coupled LDPC codes for the BEC wiretap channel," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), St. Petersburg, Russia, Aug. 2011, pp. 2393-2397.
-
(2011)
Proc. IEEE Int. Symp. Inform. Theory (ISIT)
, pp. 2393-2397
-
-
Rathi, V.1
Urbanke, R.2
Andersson, M.3
Skoglund, M.4
-
23
-
-
80051774472
-
Secret-sharing LDPC codes for the BPSKconstrained Gaussian wiretap channel
-
Sept.
-
C. W. Wong, T. Wong, and J. Shea, "Secret-sharing LDPC codes for the BPSKconstrained Gaussian wiretap channel," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 3, pp. 551-564, Sept. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Sec
, vol.6
, Issue.3
, pp. 551-564
-
-
Wong, C.W.1
Wong, T.2
Shea, J.3
-
24
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inform. Theory, vol. 57, no. 10, pp. 6428-6443, 2011.
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
25
-
-
78751480777
-
Polar coding for secure transmission and key agreement
-
Istanbul, Turkey, Sept
-
O. O. Koyluoglu and H. E. Gamal, "Polar coding for secure transmission and key agreement," in Proc. IEEE Int. Symp. Personal Indoor and Mobile Radio Commun., Istanbul, Turkey, Sept. 2010, pp. 2698-2703.
-
(2010)
Proc. IEEE Int. Symp. Personal Indoor and Mobile Radio Commun
, pp. 2698-2703
-
-
Koyluoglu, O.O.1
Gamal, H.E.2
-
26
-
-
15044364240
-
Stopping set distribution of LDPC code ensembles
-
DOI 10.1109/TIT.2004.842571
-
A. Orlitsky, K. Viswanathan, and J. Zhang, "Stopping set distribution of LDPC code ensembles," IEEE Trans. Inform. Theory, vol. 51, no. 3, pp. 929-953, Mar. 2005. (Pubitemid 40377559)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.3
, pp. 929-953
-
-
Orlitsky, A.1
Viswanathan, K.2
Zhang, J.3
-
27
-
-
80051775152
-
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
-
Sept.
-
A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 3, pp. 585-594, Sept. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Sec
, vol.6
, Issue.3
, pp. 585-594
-
-
Subramanian, A.1
Thangaraj, A.2
Bloch, M.3
McLaughlin, S.W.4
-
28
-
-
77955671723
-
Construction of wiretap codes from ordinary channel codes
-
Austin, TX, June
-
M. Hayashi and R. Matsumoto, "Construction of wiretap codes from ordinary channel codes," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Austin, TX, June 2010, pp. 2538-2542.
-
(2010)
Proc. IEEE Int. Symp. Inform. Theory (ISIT)
, pp. 2538-2542
-
-
Hayashi, M.1
Matsumoto, R.2
-
29
-
-
48649107830
-
Syndrome-coding for the wiretap channel revisited
-
Chengdu, China, Oct
-
G. Cohen and G. Zémor, "Syndrome-coding for the wiretap channel revisited," in Proc. IEEE Information Theory Workshop, Chengdu, China, Oct. 2006, pp. 33-36.
-
(2006)
Proc. IEEE Information Theory Workshop
, pp. 33-36
-
-
Cohen, G.1
Zémor, G.2
-
30
-
-
84883187820
-
Semantically secure lattice codes for the Gaussian wiretap channel
-
Oct
-
C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehlé, "Semantically secure lattice codes for the Gaussian wiretap channel," Computing Research Repository, Oct. 2012, pp. 1-19.
-
(2012)
Computing Research Repository
, pp. 1-19
-
-
Ling, C.1
Luzzi, L.2
Belfiore, J.-C.3
Stehlé, D.4
|