Two-Way Physical Layer Security Protocol for Gaussian Channels
暂无分享,去创建一个
[1] Masahide Sasaki,et al. Numerical Study on Secrecy Capacity and Code Length Dependence of the Performances in Optical Wiretap Channels , 2015, IEEE Photonics Journal.
[2] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[3] Massimo Franceschetti,et al. Wiretap Channel With Secure Rate-Limited Feedback , 2009, IEEE Transactions on Information Theory.
[4] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[5] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Shlomo Shamai,et al. The wiretap channel with generalized feedback: Secure communication and key generation , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).
[8] Masahito Hayashi,et al. Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy , 2012, 2013 IEEE International Symposium on Information Theory.
[9] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[10] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[11] Hong Wen,et al. Build-in wiretap channel I with feedback and LDPC codes , 2009, Journal of Communications and Networks.
[12] Hiroki Koga,et al. Information-Spectrum Methods in Information Theory , 2002 .
[13] Masahito Hayashi,et al. Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications , 2010, IEEE Transactions on Information Theory.
[14] Ivan Martinovic,et al. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.
[15] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[16] Masahito Hayashi,et al. Secure uniform random number extraction via incoherent strategies , 2017, ArXiv.
[17] Xiongfeng Ma,et al. Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.
[18] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[19] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[20] Himanshu Tyagi,et al. Strong converse for a degraded wiretap channel via active hypothesis testing , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[21] Masahito Hayashi,et al. Semi-Finite Length Analysis for Information Theoretic Tasks , 2018, ArXiv.
[22] Masahito Hayashi,et al. General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to wire-tap channel , 2005, ArXiv.
[23] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[24] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[25] Richard Moulds,et al. Quantum Random Number Generators , 2016 .
[26] Masahito Hayashi,et al. Secure wireless communication under spatial and local Gaussian noise assumptions , 2016, 2017 IEEE International Symposium on Information Theory (ISIT).
[27] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[28] Zhu Cao,et al. Quantum random number generation , 2015, npj Quantum Information.
[29] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[30] Masahito Hayashi,et al. Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification , 2009, IEEE Transactions on Information Theory.
[31] Masahito Hayashi,et al. Physical Layer Security for RF Satellite Channels in the Finite-Length Regime , 2018, IEEE Transactions on Information Forensics and Security.
[32] Hong Wen,et al. Build-in wiretap channel I with feedback and LDPC codes by soft decision decoding , 2017, IET Commun..
[33] Maria Angeles Vázquez-Castro,et al. Information-theoretic physical layer security for satellite channels , 2016, 2017 IEEE Aerospace Conference.
[34] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[35] Maria Angeles Vázquez-Castro,et al. Statistical modeling of the LMS channel , 2001, IEEE Trans. Veh. Technol..
[36] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[37] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[38] Masahito Hayashi,et al. General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel , 2006, IEEE Transactions on Information Theory.
[39] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[40] Masahito Hayashi,et al. One-Way and Two-Way Physical Layer Security Protocols for the Gaussian Satellite Channel , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[41] Himanshu Tyagi,et al. Secret Key Agreement: General Capacity and Second-Order Asymptotics , 2014, IEEE Transactions on Information Theory.
[42] H. Vincent Poor,et al. Wiretap Channels: Nonasymptotic Fundamental Limits , 2017, IEEE Transactions on Information Theory.
[43] Yi Yang,et al. An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement , 2017, Entropy.
[44] Masahito Hayashi. Quantum-Inspired Secure Wireless Communication Protocol Under Spatial and Local Gaussian Noise Assumptions , 2016, IEEE Access.