Polar coding for secret-key generation
Practical implementations of secret-key generation are often based on sequential strategies,
which handle reliability and secrecy in two successive steps, called reconciliation and …
which handle reliability and secrecy in two successive steps, called reconciliation and …
Separation of reliability and secrecy in rate-limited secret-key generation
For a discrete or a continuous source model, we study the problem of secret-key generation
with one round of rate-limited public communication between two legitimate users. Although …
with one round of rate-limited public communication between two legitimate users. Although …
Secret-key generation using compound sources and one-way public communication
N Tavangaran, H Boche… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In the classical secret-key generation model, common randomness is generated by two
terminals based on the observation of correlated components of a common source, while …
terminals based on the observation of correlated components of a common source, while …
The effect of eavesdropper's statistics in experimental wireless secret-key generation
This paper investigates the role of the eavesdropper's statistics in the implementation of a
practical secret-key generation system. We carefully conduct the information-theoretic …
practical secret-key generation system. We carefully conduct the information-theoretic …
Compound biometric authentication systems with strong secrecy
N Tavangaran, S Baur, A Grigorescu… - SCC 2017; 11th …, 2017 - ieeexplore.ieee.org
In classical biometric authentication systems, the authenticity of each user is determined by
comparing two secret-keys which are generated based on the user's biometric enrollment …
comparing two secret-keys which are generated based on the user's biometric enrollment …
Robust biometric authentication from an information theoretic perspective
A Grigorescu, H Boche, RF Schaefer - Entropy, 2017 - mdpi.com
Robust biometric authentication is studied from an information theoretic perspective.
Compound sources are used to account for uncertainty in the knowledge of the source …
Compound sources are used to account for uncertainty in the knowledge of the source …
Arbitrarily varying wiretap channels with non-causal side information at the jammer
CR Janda, M Wiese, EA Jorswieck… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secure communication in a potentially hostile environment is becoming more and more
critical. The A rbitrarily V arying W iretap C hannel (AVWC) provides information-theoretical …
critical. The A rbitrarily V arying W iretap C hannel (AVWC) provides information-theoretical …
Secret-key capacity of compound source models with one-way public communication
N Tavangaran, H Boche… - 2015 IEEE Information …, 2015 - ieeexplore.ieee.org
In the classical Secret-Key generation model, Common Randomness is generated by two
terminals based on the observation of correlated components of a common source, while …
terminals based on the observation of correlated components of a common source, while …
Robust secret-key generation under source uncertainty and communication rate constraint
N Tavangaran - 2018 - mediatum.ub.tum.de
In this work, secret-key generation based on a three-party compound source is studied
where the communication rate between legitimate users is limited. A robust secret-key …
where the communication rate between legitimate users is limited. A robust secret-key …
[PDF][PDF] Coding techniques for multi-user physical layer security.
AJ Pierrot - 2015 - core.ac.uk
I truly owe this thesis to my beloved family, who provided with its love and support for the last
26 years. My mom, Sandrine, who taught me her sense of esthetics and details, my dad …
26 years. My mom, Sandrine, who taught me her sense of esthetics and details, my dad …