|
[1] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York, NY, USA: John Wiley & Sons, Inc., 2nd ed., 1995. [2] W. Stallings, Cryptography and Network Security: Principles and Practice. Upper Saddle River, NJ, USA: Prentice Hall Press, 6th ed., 2013. [3] C. E. Shannon, “Communication theory of secrecy systems," The Bell System Technical Journal, vol. 28, pp. 656-715, Oct 1949. [4] A. D. Wyner, “The wire-tap channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. [5] S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap channel," IEEE Transactions on Information Theory, vol. 24, pp. 451-456, Jul 1978. [6] I. Csiszar and J. Korner, “Broadcast channels with confidential messages," IEEE Transactions on Information Theory, vol. 24, pp. 339-348, May 1978. [7] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel," IEEE Transactions on Information Theory, vol. 57, pp. 4961-4972, Aug 2011. [8] L. Lai and H. E. Gamal, “The relay-eavesdropper channel: Cooperation for secrecy," IEEE Transactions on Information Theory, vol. 54, pp. 4005-4019, Sept 2008. [9] A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. M. Merolla, ”Applications of ldpc codes to the wiretap channel," IEEE Transactions on Information Theory, vol. 53, pp. 2933-2945, Aug 2007. [10] D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B. J. Kwak, “Ldpc codes for the gaussian wiretap channel," IEEE Transactions on Information Forensics and Security, vol. 6, pp. 532-540, Sept 2011. [11] H. Mahdavifar and A. Vardy, “Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Transactions on Information Theory, vol. 57, pp. 6428-6443, Oct 2011. [12] W. Kang and N. Liu, “Wiretap channel with shared key," in Information Theory Workshop (ITW), 2010 IEEE, pp. 1-5, Aug 2010. [13] E. Ardestanizadeh, M. Franceschetti, T. Javidi, and Y. H. Kim, “Wiretap channel with secure rate-limited feedback," IEEE Transactions on Information Theory, vol. 55, pp. 5353-5361, Dec 2009. [14] Y. K. Chia and A. E. Gamal, “Wiretap channel with causal state information," IEEE Transactions on Information Theory, vol. 58, pp. 2838-2849, May 2012. [15] A. Cohen and A. Cohen, “Wiretap channel with causal state information and secure rate-limited feedback," IEEE Transactions on Communications, vol. 64, pp. 1192-1203, March 2016. [16] A. Kuznetsov and B. Tsybakov, “Coding in a memory with defective cells," Problemy peredachi informatsii, vol. 10, pp. 52-60, April-June 1974. [17] G. Kramer, “Topics in multi-user information theory," Foundations and Trends in Communications and Information Theory, vol. 4, no. 45, pp. 265-444, 2008. [18] S. I. Gelfand and M. S. Pinsker, Coding for Channel with Random Parameters, vol. 9, pp. 19-31. 1980. [19] M. H. M. Costa, “Writing on dirty paper," IEEE Transactions on Information Theory, vol. IT-29, pp. 439-441, May 1983. [20] C. Mitrpant, A. J. H. Vinck, and Y. Luo, “An achievable region for the Gaussian wiretap channel with side information," IEEE Transactions on Information Theory, vol. 52, pp. 2181-2190, May 2006. [21] Y. Chen and A. J. H. Vinck, “Wiretap channel with side information," IEEE Transactions on Information Theory, vol. 54, pp. 395-402, Jan 2008. [22] M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. New York, NY, USA: Cambridge University Press, 1st ed., 2011. [23] G. Cardano and T. Witmer, Ars Magna Or The Rules of Algebra. Dover Books on Advanced Mathematics, Dover, 1968.
|