Author of the publication

On the Eavesdropper's Correct Decision in Gaussian and Fading Wiretap Channels Using Lattice Codes

, and . CoRR, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Information Retrieval from Coded Databases with Colluding Servers., , , and . CoRR, (2016)Information Bounds and Flatness Factor Approximation for Fading Wiretap Channels., , , and . CoRR, (2016)Space-time storage codes for wireless distributed storage systems., , , and . VITAE, page 1-5. IEEE, (2014)Strong secrecy in wireless network coding systems with M-QAM modulators., , , , and . ICCC, page 181-186. IEEE, (2014)Rotating non-uniform and high-dimensional constellations using geodesic flow on lie groups., and . ICC, page 5884-5889. IEEE, (2014)On the Capacity of Private Information Retrieval from Coded, Colluding, and Adversarial Servers., , and . ITW, page 1-5. IEEE, (2019)Fast-Decodable Space-Time Codes for the N-Relay and Multiple-Access MIMO Channel., , and . IEEE Trans. Wirel. Commun., 15 (3): 1754-1767 (2016)N-Sum Box: An Abstraction for Linear Computation over Many-to-one Quantum Networks., , , , , and . GLOBECOM, page 5457-5462. IEEE, (2023)Improved Private and Secure Distributed (Batch) Matrix Multiplication., and . CoRR, (2021)Reducing complexity with less than minimum delay space-time lattice codes., and . ITW, page 130-134. IEEE, (2011)