Physical-Layer Security: Combining Error Control Coding and Cryptography
暂无分享,去创建一个
[1] T. Moon. Error Correction Coding: Mathematical Methods and Algorithms , 2005 .
[2] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[3] Victor K.-W. Wei,et al. Generalized Hamming weights for linear codes , 1991, IEEE Trans. Inf. Theory.
[4] Dominic J. A. Welsh,et al. Codes and cryptography , 1988 .
[5] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] F. Jonsson,et al. Theoretical analysis of a correlation attack based on convolutional codes , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[8] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[9] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[10] T. Moon,et al. Mathematical Methods and Algorithms for Signal Processing , 1999 .
[11] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[12] I. G. Núñez,et al. Generalized Hamming Weights for Linear Codes , 2001 .
[13] Thomas Johansson,et al. Theoretical analysis of a correlation attack based on convolutional codes , 2002, IEEE Trans. Inf. Theory.
[14] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[15] Vladimir V. Chepyzhov,et al. On A Fast Correlation Attack on Certain Stream Ciphers , 1991, EUROCRYPT.
[16] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[17] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..