Strong and weak secrecy in wiretap channels
暂无分享,去创建一个
A Subramanian | A T Suresh | S Raj | A Thangaraj | M Bloch | S McLaughlin
[1] Rüdiger L. Urbanke,et al. Modern Coding Theory , 2008 .
[2] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[3] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[4] Andrew Thangaraj,et al. Strong secrecy for erasure wiretap channels , 2010, 2010 IEEE Information Theory Workshop.
[5] G. Zemor,et al. Syndrome-coding for the wiretap channel revisited , 2006, 2006 IEEE Information Theory Workshop - ITW '06 Chengdu.
[6] David Burshtein,et al. Asymptotic enumeration methods for analyzing LDPC codes , 2004, IEEE Transactions on Information Theory.
[7] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[10] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[11] Alon Orlitsky,et al. Stopping set distribution of LDPC code ensembles , 2003, IEEE Transactions on Information Theory.
[12] H. Vincent Poor,et al. Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.