Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel
暂无分享,去创建一个
Roberto Di Pietro | Stefano Guarino | Giulio Aliberti | R. D. Pietro | Stefano Guarino | G. Aliberti
[1] Ling Liu,et al. Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices , 2015, IEEE Transactions on Information Theory.
[2] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[3] Pablo Piantanida,et al. Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels , 2014, IEEE Transactions on Information Theory.
[4] James S. Plank,et al. AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.
[5] Kenneth W. Shum,et al. Imperfect secrecy in wiretap channel II , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[6] Shlomo Shamai,et al. An Information Theoretic Approach to Secret Sharing , 2015, IEEE Transactions on Information Theory.
[7] H. Vincent Poor,et al. Generalized Multiple Access Channels with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.
[8] Reihaneh Safavi-Naini,et al. A Model for Adversarial Wiretap Channels , 2016, IEEE Transactions on Information Theory.
[9] John M. Shea,et al. LDPC code design for the BPSK-constrained Gaussian wiretap channel , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[10] H. Vincent Poor,et al. On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels , 2014, IEEE Transactions on Information Forensics and Security.
[11] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[12] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[13] Matthieu R. Bloch,et al. The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel , 2014 .
[14] Mahdi Cheraghchi,et al. Invertible extractors and wiretap protocols , 2009, 2009 IEEE International Symposium on Information Theory.
[15] Amit Sahai,et al. On Perfect and Adaptive Security in Exposure-Resilient Cryptography , 2001, EUROCRYPT.
[16] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[17] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[18] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[19] Alexander Barg,et al. Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component , 2015, ITW.
[20] Masahide Sasaki,et al. Reliability and Secrecy Functions of the Wiretap Channel Under Cost Constraint , 2013, IEEE Transactions on Information Theory.
[21] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[22] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[23] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[24] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[25] Steven W. McLaughlin,et al. Physical-Layer Security: Combining Error Control Coding and Cryptography , 2009, 2009 IEEE International Conference on Communications.
[26] Ivan Damgård,et al. Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions , 2015, EUROCRYPT.
[27] Marco Baldi,et al. Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[28] Andrew Thangaraj,et al. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes , 2010, IEEE Transactions on Information Forensics and Security.
[29] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.
[30] U. Maurer. The Strong Secret Key Rate of Discrete Random Triples , 1994 .
[31] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[32] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[33] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[34] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[35] Aylin Yener,et al. Wiretap channel II with a noisy main channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[36] I. G. Núñez,et al. Generalized Hamming Weights for Linear Codes , 2001 .
[37] Mohamed-Slim Alouini,et al. On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.
[38] Adi Shamir,et al. How to share a secret , 1979, CACM.
[39] Mahdi Cheraghchi,et al. Invertible Extractors and Wiretap Protocols , 2012, IEEE Trans. Inf. Theory.
[40] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.