Semantically-secured message-key trade-off over wiretap channels with random parameters, Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security, pp.33-48, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01742444
, Semantically-secured message-key trade-off over wiretap channels with random parameters, 2017.
Physical-Layer Security: From Information Theory to Security Engineering, 2011. ,
Physical layer security for next generation wireless networks: Theories, technologies, and challenges, IEEE Commun. Surv. Tut, vol.19, issue.1, pp.347-376, 2017. ,
Physical layer key generation in wireless networks: challenges and opportunities, IEEE Commun. Mag, vol.53, issue.6, pp.33-39, 2015. ,
The wire-tap channel, Bell Sys. Techn, vol.54, issue.8, pp.1355-1387, 1975. ,
Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, vol.24, issue.3, pp.339-348, 1978. ,
The common information of two dependent random variables, IEEE Trans. Inf. Theory, vol.21, issue.2, pp.163-179, 1975. ,
Approximation theory of output statistics, IEEE Trans. Inf. Theory, vol.39, issue.3, pp.752-772, 1993. ,
Informational divergence approximations to product distributions, Proc. 13th Canadian Workshop Inf. Theory (CWIT), 2013. ,
Semantic-security capacity for wiretap channels of type II, IEEE Trans. Inf. Theory, vol.62, issue.7, pp.3863-3879, 2016. ,
, Arbitrarily varying wiretap channels with type constrained states, IEEE Trans. Inf. Theory, vol.62, issue.12, pp.7216-7244, 2016.
Exact random coding secrecy exponents for the wiretap channel, IEEE Trans. Inf. Theory, vol.63, issue.1, pp.509-531, 2017. ,
Exact soft-covering exponent, 2018 IEEE Int. Symp. Inf. Theory (ISIT), pp.1680-1684, 2018. ,
Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory, vol.39, issue.3, pp.733-742, 1993. ,
Common randomness in information theory and cryptography. part i: secret sharing, IEEE Trans. Inf. Theory, vol.39, issue.4, pp.1121-1132, 1993. ,
Common randomness and secret key generation with a helper, IEEE Trans. Inf. Theory, vol.46, issue.2, pp.344-366, 2000. ,
The rate-distortion function for source coding with side information at the decoder, IEEE Trans. Inf. Theory, vol.1, pp.1-10, 1976. ,
Coding for channel with random parameters, Problemy Pered. Inform. (Problems of Inf. Trans.), vol.9, issue.1, pp.19-31, 1980. ,
Wiretap channel with side information, IEEE Trans. Inf. Theory, vol.54, issue.1, pp.395-402, 2008. ,
Wiretap channel with random states non-causally available at the encoder, ArXiv preprint, 2016. ,
On the secrecy capacity of wiretap channels with side information at the transmitter, IEEE Trans. Inf. Forensic Secur, vol.11, issue.11, pp.2441-2452, 2016. ,
Wiretap channels with causal state information: Strong secrecy, 2017. ,
Secret-key agreement with channel state information at the transmitter, IEEE Trans. Inf. Forensic Secur, vol.6, issue.3, pp.672-681, 2011. ,
Secret key generation over noisy channels with common randomness, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01436842
Secrecy via sources and channels, IEEE Trans. Inf. Theory, vol.85, issue.11, pp.6747-6765, 2012. ,
The likelihood encoder for lossy compression, IEEE Trans. Inf. Theory, vol.62, issue.4, pp.1836-1849, 2016. ,
A cryptographic treatment of the wiretap channel, Proc. Adv. Crypto. (CRYPTO 2012), 2012. ,
Key generation over wiretap models with non-causal side information, IEEE Trans. Inf. Forensic Secur, vol.10, issue.7, pp.1456-1471, 2015. ,
, , 1958.
Information theoretic security, Foundations and Trends R in Commun. and Inf. Theory, vol.5, issue.4-5, pp.355-580, 2009. ,
Wiretap channel with two-sided state information, Proc. 41st Asilomar Conf. Signals, Syst. Comp, p.893897, 2007. ,
Wiretap channel with causal state information, IEEE Trans. Inf. Theory, vol.58, issue.5, pp.2838-2849, 2012. ,
Secret-key generation using correlated sources and channels, IEEE Trans. Inf. Theory, vol.58, issue.2, pp.652-670, 2012. ,
Channels with side information at the transmitter, IBM J. Res. Devel, vol.2, issue.4, pp.289-293, 1958. ,
Coding in a memory with defective cells, Problemy Pered. Inform. (Problems of Inf. Trans.), vol.10, issue.2, pp.52-60, 1974. ,
, Elements of Information Theory, 2006.
Wiretap channel with action-dependent channel state information, Entropy, vol.15, pp.445-473, 2013. ,
Common randomness in information theory and cryptography. ii. cr capacity, Information Theory, IEEE Transactions on, vol.44, pp.225-240, 1998. ,
On the capasity of computer memories with defects, IEEE Trans. Inf. Theory, pp.731-739, 1983. ,
Channel capacity with causal and noncaudal side information -a unified view, IEEE Trans. Inform. Theory, vol.52, issue.12, pp.5468-5474, 2006. ,