Articles with "wiretap channel" as a keyword



Photo by sarahdorweiler from unsplash

Randomized Serially Concatenated LDGM Codes for the Gaussian Wiretap Channel

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2018.2789346

Abstract: We study the application of a special class of low-density parity-check codes to the wiretap channel. We construct a randomized coding scheme based on serially concatenated low-density generator matrix codes and their duals extending the… read more here.

Keywords: serially concatenated; randomized serially; wiretap channel; concatenated ldgm ... See more keywords
Photo by edhoradic from unsplash

Short Blocklength Wiretap Channel Codes via Deep Learning: Design and Performance Evaluation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2023.3237259

Abstract: We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees. Our approach consists in decoupling the reliability and secrecy constraints in our code design. Specifically, we handle the reliability constraint via… read more here.

Keywords: design; wiretap channel; secrecy; short blocklength ... See more keywords
Photo from wikipedia

Finite State Markov Wiretap Channel With Delayed Feedback

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2016.2636085

Abstract: The finite-state Markov channel (FSMC), where the channel transition probability is controlled by a state undergoing a Markov process, is a useful model for the mobile wireless communication channel. In this paper, we investigate the… read more here.

Keywords: state; markov wiretap; wiretap channel; finite state ... See more keywords
Photo by saadahmad_umn from unsplash

Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2018.2794327

Abstract: In this paper, an explicit scheme of wiretap coding based on polar lattices is proposed to achieve the secrecy capacity of the additive white Gaussian noise (AWGN) wiretap channel. First, polar lattices are used to… read more here.

Keywords: tex math; wiretap channel; polar lattices; inline formula ... See more keywords
Photo from wikipedia

Optical Wiretap Channel With Input-Dependent Gaussian Noise Under Peak- and Average-Intensity Constraints

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2018.2851225

Abstract: This paper studies the optical wiretap channel with input-dependent Gaussian noise, in which the main distortion is caused by an additive Gaussian noise whose variance depends on the current signal strength. Subject to nonnegativity and… read more here.

Keywords: wiretap channel; input; capacity; intensity ... See more keywords
Photo from wikipedia

Chaotic Encrypted Polar Coding Scheme for General Wiretap Channel

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2016.2636908

Abstract: A wiretap channel is an important model for wireless communication. By applying an extended multiblock polar coding scheme, recent literature has achieved the secrecy capacity of a general wiretap channel (not necessary degraded or symmetric).… read more here.

Keywords: transmission; channel; wiretap channel; coding scheme ... See more keywords
Photo from wikipedia

Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24111595

Abstract: This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any… read more here.

Keywords: wiretap channel; presence; jammer; wiretap ... See more keywords