Author of the publication

Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy.

, , , and . WIFS, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ε-Almost Collision-Flat Universal Hash Functions Motivated by Information-Theoretic Security., and . ISIT, page 2589-2594. IEEE, (2023)Mosaics of combinatorial designs for privacy amplification., and . ISIT, page 1630-1635. IEEE, (2021)Common Randomness Generation over Slow Fading Channels., , , and . ISIT, page 1925-1930. IEEE, (2021)Optimal power allocation policies for the reliable transmission of a single packet via ARQ protocols., , and . ACSCC, page 475-479. IEEE, (2008)Statistical verification of upper and lower bounds for the security performance of wiretap channels., , , and . WCNC, page 1-6. IEEE, (2023)Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs., and . IEEE Trans. Inf. Theory, 67 (1): 52-80 (2021)Identification over the Gaussian Channel in the Presence of Feedback., , , and . ISIT, page 278-283. IEEE, (2021)A Rigorous Proof of the Capacity of MIMO Gauss-Markov Rayleigh Fading Channels., , , and . ISIT, page 2732-2737. IEEE, (2022)Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment., , , , , , and . GLOBECOM, page 4044-4050. IEEE, (2022)Information-Theoretically Secret Reed-Muller Identification with Affine Designs., , , , and . CoRR, (2023)