Achieving the secrecy capacity of wiretap channels using Polar codes
暂无分享,去创建一个
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] Rüdiger L. Urbanke,et al. Modern Coding Theory , 2008 .
[3] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[4] Ofer Amrani,et al. Joint equalization and coding for intersymbol interference channels , 1997, IEEE Trans. Inf. Theory.
[5] Eren Sasoglu. An entropy inequality for q-ary random variables and its application to channel polarization , 2010, 2010 IEEE International Symposium on Information Theory.
[6] Rüdiger L. Urbanke,et al. Polar Codes for Channel and Source Coding , 2009, ArXiv.
[7] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[8] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[9] R. Gallager. Information Theory and Reliable Communication , 1968 .
[10] Mahdi Cheraghchi,et al. Invertible extractors and wiretap protocols , 2009, 2009 IEEE International Symposium on Information Theory.
[11] Sik K. Leung-Yan-Cheong. On a special class of wiretap channels (Corresp.) , 1977, IEEE Trans. Inf. Theory.
[12] Rüdiger L. Urbanke,et al. Polar codes: Characterization of exponent, bounds, and constructions , 2009, 2009 IEEE International Symposium on Information Theory.
[13] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[14] Ryuhei Mori,et al. Performance and construction of polar codes on symmetric binary-input memoryless channels , 2009, 2009 IEEE International Symposium on Information Theory.
[15] U. Maurer. The Strong Secret Key Rate of Discrete Random Triples , 1994 .
[16] Robert J. McEliece,et al. The Theory of Information and Coding , 1979 .
[17] E. Arkan,et al. A performance comparison of polar codes and Reed-Muller codes , 2008, IEEE Communications Letters.
[18] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[19] Shlomo Shamai,et al. Secrecy-Achieving Polar-Coding for Binary-Input Memoryless Symmetric Wire-Tap Channels , 2010, ArXiv.
[20] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[21] Rüdiger L. Urbanke,et al. On the scaling of polar codes: I. The behavior of polarized channels , 2010, 2010 IEEE International Symposium on Information Theory.
[22] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[23] Rüdiger L. Urbanke,et al. Polar Codes for Channel and Source Coding , 2009, ArXiv.
[24] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[25] Emre Telatar,et al. On the rate of channel polarization , 2008, 2009 IEEE International Symposium on Information Theory.
[26] Andrew Thangaraj,et al. Strong secrecy for erasure wiretap channels , 2010, 2010 IEEE Information Theory Workshop.
[27] G. Zemor,et al. Syndrome-coding for the wiretap channel revisited , 2006, 2006 IEEE Information Theory Workshop - ITW '06 Chengdu.
[28] Toshiyuki Tanaka,et al. Performance of polar codes with the construction using density evolution , 2009, IEEE Communications Letters.
[29] Emre Telatar,et al. Polarization for arbitrary discrete memoryless channels , 2009, 2009 IEEE Information Theory Workshop.
[30] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[31] Ilya Dumer,et al. Soft-decision decoding of Reed-Muller codes: recursive lists , 2006, IEEE Transactions on Information Theory.
[32] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[33] Shlomo Shamai,et al. Secrecy-achieving polar-coding , 2010, 2010 IEEE Information Theory Workshop.
[34] Marten van Dijk. On a special class of broadcast channels with confidential messages , 1997, IEEE Trans. Inf. Theory.
[35] Mikael Skoglund,et al. Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.
[36] Victor K.-W. Wei,et al. Generalized Hamming weights for linear codes , 1991, IEEE Trans. Inf. Theory.
[37] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.