Forward Reconciliation for Covert Key Generation
暂无分享,去创建一个
[1] Donald F. Towsley,et al. Covert communication over classical-quantum channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[2] Juan Miguel Arrazola,et al. Covert Quantum Communication. , 2016, Physical review letters.
[3] R. Amiri,et al. Secret-key expansion from covert communication , 2017, 1708.09103.
[4] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[5] Matthieu R. Bloch,et al. Polar codes for covert communications over asynchronous Discrete Memoryless Channels , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[6] Mayank Bakshi,et al. Computationally efficient deniable communication , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[7] Sergio Verdú,et al. $f$ -Divergence Inequalities , 2015, IEEE Transactions on Information Theory.
[8] Matthieu R. Bloch,et al. Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels , 2018, IEEE Transactions on Information Theory.
[9] Remi A. Chou,et al. Polar coding for secret-key generation , 2013, 2013 IEEE Information Theory Workshop (ITW).
[10] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[11] Erdal Arikan,et al. Source polarization , 2010, 2010 IEEE International Symposium on Information Theory.
[12] Saikat Guha,et al. Quantum-secure covert communication on bosonic channels , 2015, Nature Communications.
[13] Matthieu R. Bloch,et al. Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels , 2020, IEEE Transactions on Information Theory.
[14] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[15] Ligong Wang. Optimal throughput for covert communication over a classical-quantum channel , 2016, 2016 IEEE Information Theory Workshop (ITW).
[16] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[17] Matthieu R. Bloch,et al. Optimal covert communications using pulse-position modulation , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).