Secret key generation over noisy channels with common randomness
暂无分享,去创建一个
[1] Camilla Hollanti,et al. Physical Layer Security: A Paradigm Shift in Data Confidentiality , 2016 .
[2] Haim H. Permuter,et al. Wiretap channels with random states non-causally available at the encoder , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).
[3] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[4] L. Goddard. Information Theory , 1962, Nature.
[5] Jun Muramatsu. General formula for secrecy capacity of wiretap channel with noncausal state , 2014, 2014 IEEE International Symposium on Information Theory.
[6] Thomas M. Cover,et al. Network Information Theory , 2001 .
[7] Thomas A. Courtade,et al. Coded Cooperative Data Exchange for a Secret Key , 2014, IEEE Transactions on Information Theory.
[8] Himanshu Tyagi,et al. Secret Key Agreement: General Capacity and Second-Order Asymptotics , 2014, IEEE Transactions on Information Theory.
[9] Haim H. Permuter,et al. Semantic-security capacity for wiretap channels of type II , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).
[10] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[11] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[12] Wei Liu,et al. Wiretap Channel With Two-Sided Channel State Information , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.
[13] Sung Hoon Lim,et al. Lossy communication of correlated sources over multiple access channels , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[14] Mikael Skoglund,et al. Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback , 2013, IEEE Journal on Selected Areas in Communications.
[15] Vinod M. Prabhakaran,et al. Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.
[16] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[17] Sennur Ulukus,et al. Secure lossy source coding with side information , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[18] Imre Csiszár,et al. Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.
[19] Bin Dai,et al. Wiretap Channel With Side Information , 2006, ArXiv.
[20] Shlomo Shamai,et al. Secure Transmission of Sources Over Noisy Channels With Side Information at the Receivers , 2012, IEEE Transactions on Information Theory.
[21] Sung Hoon Lim,et al. A Unified Approach to Hybrid Coding , 2015, IEEE Transactions on Information Theory.
[22] Chandra Nair. Capacity regions of two new classes of 2-receiver broadcast channels , 2009, ISIT.
[23] Himanshu Tyagi,et al. Common Information and Secret Key Capacity , 2013, IEEE Transactions on Information Theory.
[24] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[25] Tetsunao Matsuta,et al. 国際会議開催報告:2013 IEEE International Symposium on Information Theory , 2013 .
[26] Shlomo Shamai,et al. The wiretap channel with generalized feedback: Secure communication and key generation , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).
[27] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[28] Pablo Piantanida,et al. The Gaussian wiretap channel with correlated sources at the terminals: Secret communication and key generation , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).
[29] Ali Zibaeenejad. Key Generation Over Wiretap Models With Non-Causal Side Information , 2015, IEEE Transactions on Information Forensics and Security.
[30] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[31] Suhas N. Diggavi,et al. Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.
[32] Pablo Piantanida,et al. Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.
[33] Suhas N. Diggavi,et al. Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.
[34] Moritz Wiese,et al. A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.
[35] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.