Applications of LDPC Codes to the Wiretap Channel
暂无分享,去创建一个
A. Robert Calderbank | Andrew Thangaraj | Steven W. McLaughlin | Jean-Marc Merolla | Souvik Dihidar | A. Calderbank | S. McLaughlin | A. Thangaraj | J. Merolla | Souvik Dihidar | F. I. A. R. Calderbank | Member Ieee Andrew Thangaraj | Senior Member Ieee Steven McLaughlin | Member Ieee Jean-Marc Merolla
[1] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[2] Teofilo C. Ancheta. Duality for the group-coset probability ratio , 1982, IEEE Trans. Inf. Theory.
[3] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[4] Ueli Maurer,et al. Secret key agreement by public discussion , 1993 .
[5] Simon J. D. Phoenix,et al. Quantum cryptography: How to beat the code breakers using quantum mechanics , 1995 .
[6] Teofilo C. Ancheta. An upper bound on the ratio of the probabilities of subgroups and cosets , 1981, IEEE Trans. Inf. Theory.
[7] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[8] Daniel D. Sullivan. A fundamental inequality between the probabilities of binary subgroups and cosets , 1967, IEEE Trans. Inf. Theory.
[9] N. Gisin,et al. Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses , 2001, quant-ph/0102062.
[10] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[11] Marten van Dijk. On a special class of broadcast channels with confidential messages , 1997, IEEE Trans. Inf. Theory.
[12] Amin Shokrollahi,et al. Capacity-achieving sequences for the erasure channel , 2002, IEEE Trans. Inf. Theory.
[13] J. Goedgebuer,et al. Long-distance QKD transmission using single-sideband detection scheme With WDM synchronization , 2003 .
[14] I. G. Núñez,et al. Generalized Hamming Weights for Linear Codes , 2001 .
[15] Rüdiger L. Urbanke,et al. Efficient encoding of low-density parity-check codes , 2001, IEEE Trans. Inf. Theory.
[16] Masahito Hayashi,et al. General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to wire-tap channel , 2005, ArXiv.
[17] D. A. Bell,et al. Information Theory and Reliable Communication , 1969 .
[18] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[19] Victor K.-W. Wei,et al. Generalized Hamming weights for linear codes , 1991, IEEE Trans. Inf. Theory.
[20] David J. C. MacKay,et al. Sparse-graph codes for quantum error correction , 2004, IEEE Transactions on Information Theory.
[21] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[22] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[23] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[24] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[25] Masahito Hayashi,et al. Exponents of channel resolvability and wire-tapped channel , 2004 .
[26] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[27] Masahito Hayashi,et al. General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel , 2006, IEEE Transactions on Information Theory.
[28] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[29] Jun Muramatsu,et al. Secret Key Agreement from Correlated Source Outputs Using Low Density Parity Check Matrices , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..