Publications

Export 95 results:
[ Author(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Arumugam, K. Suria Kuma, and M. R. Bloch, "Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel", Proc. of Global Conference on Signal and Information Processing, Austin, TX, pp. 277–280, September, 2013.
Arumugam, K. Suria Kuma, M. R. Bloch, and E. Abbe, "Polar Coding for Secret-Key Generation", Proc. of Information Theory Workshop, Sevilla, Spain, pp. 1-5, April, 2013.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Uniform Distributed Source Coding for the Multiple Access Wiretap Channel", Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, pp. 127–132, October, 2014.
Arumugam, K.. S. K., and M. R. Bloch, "Keyless asynchronous covert communication", Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, pp. 191-195, September, 2016.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Keyless Covert Communication over Multiple-Access Channels", Proc. of IEEE International Symposium on Information Theory, pp. 2229-2233, July, 2016.
Arumugam, K. Suria Kuma, M. R. Bloch, and J. Kliewer, "Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel", Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, pp. 466–470, November, 2014.
B
Barros, J., and M. R. Bloch, "Strong Secrecy for Wireless Channels", Information Theoretic Security, Calgary, Canada, Springer Berlin / Heidelberg, pp. 40-53, August, 2008.
Bassily, R., E. Ekrem, X. He, E. Tekin, J. Xie, M. R. Bloch, S. Ulukus, and A. Yener, "Cooperative Security at the Physical Layer: A Summary of Recent Advances", {IEEE} {S}ignal {P}rocessing {M}agazine, vol. 30, no. 5, pp. 16–28, September, 2013.
Bloch, M. R., Physical-Layer Security, : Georgia Institute of Technology, August, 2008.
Bloch, M. R., and N. J. Laneman, "On the Secrecy Capacity of Arbitrary Wiretap Channels", Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 818–825, September, 2008.
Bloch, M. R., "A Channel Resolvability Perpsective on Stealth Communications", IEEE International Symposium on Information Theory, Hong Kong, pp. 2535 - 2539, June, 2015.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security", {IEEE} {T}rans. {I}nf. {T}heory, vol. 54, no. 6, pp. 2515–2534, June, 2008.
Bloch, M. R., "Covert Communication over Noisy Channels: A Resolvability Perspective", IEEE Transactions on Information Theory, vol. 62, issue 5, pp. 2334-2354, May, 2016.
Bloch, M. R., R. Narasimha, and S. W. McLaughlin, "Network Security for Client-Server Architecture using Wiretap Codes", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 3, no. 3, pp. 404–413, September, 2008.
Bloch, M. R., and J. Kliewer, "Strong coordination over a line network", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2319-2323, July, 2013.
Bloch, M. R., "Channel Scrambling for Secrecy", Proc. of IEEE International Symposium on Information Theory, Seoul, Korea, pp. 2452–2456, July, 2009.
Bloch, M. R., and N. J. Laneman, "Information-Spectrum Methods for Information-Theoretic Security", Proc. Information Theory and Applications Workshop, San Diego, CA, pp. 23–28, February, 2009.
Bloch, M. R., "Physical Layer Security in Wireless Communications", Wireless Networks and Mobile Communications: CRC Press, pp. 1–26, 2013.
Bloch, M. R., L. Luzzi, and J. Kliewer, "Strong Coordination with Polar Codes", Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 565-571, October, 2012.
Bloch, M. R., J. Barros, and S. W. McLaughlin, "Practical Information-Theoretic Commitment", Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, pp. 1035–1039, September, 2007.
Bloch, M. R., R. Narasimha, and S. W. McLaughlin, "Client-Server Architecture Design based on Wiretap Codes", Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, pp. 44–47, March, 2008.
Bloch, M. R., and J. Kliewer, "Strong Coordination over a Three-Terminal Relay Network", Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, pp. 646–650, November, 2014.
Bloch, M. R., "Channel Intrinsic Randomness", Proc. of IEEE International Symposium on Information Theory, Austin, TX, pp. 2607–2611, June, 2010.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "LDPC-based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper's Channels", Proc. IEEE Information Theory Workshop, Chengdu, China, pp. 155-159, October, 2006.
Bloch, M. R., A. Thangaraj, S. W. McLaughlin, and J-M. Merolla, "LDPC-based Secret Key Agreement over the Gaussian wiretap channel", Proc. IEEE International Symposium on Information Theory, Seattle, USA, pp. 1179-1183, July, 2006.
Bloch, M. R., and N. J. Laneman, "Exploiting Partial Channel State Information for Secrecy over Wireless Channels", {IEEE} {J}ournal on {S}elected {A}reas in {C}ommunications, vol. 31, no. 9, pp. 1840-1849, September, 2013.
Bloch, M. R., and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering, : Cambridge University Press, October, 2011.
Bloch, M. R., J.-M.. Merolla, S. W. McLaughlin, and J.-P.. Goedgebuer, "Long distance continuous variable transmission system using sideband detection method", First Russian-French Laser Physics Workshop for Young Scientists (RFLPW-YS), St. Petersburg, Russia, July, 2004.
Bloch, M. R., M. Hayashi, and A. Thangaraj, "Error-Control Coding for Physical-Layer Secrecy", Proceedings of IEEE, vol. 103, issue 10, pp. 1725-1746, October, 2015.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "An Opportunistic Physical-Layer Approach to Secure Wireless Communications", Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, pp. 849–854, September, 2006.
Bloch, M. R., A. Thangaraj, S. W. McLaughlin, and J-M. Merolla, "LDPC-based Gaussian Key Reconciliation", Proc. IEEE Information Theory Workshop, Punta del Este, Uruguay, pp. 116-120, March, 2006.
Bloch, M. R., and N. J. Laneman, "Strong Secrecy from Channel Resolvability", {IEEE} {T}ransactions on {I}nformation {T}heory, vol. 59, no. 12, pp. 8077-8098, December, 2013.
Bloch, M. R., Reconciliation algorithm and quantum key distribution methods adapted for the frequency domain, : {Université de Franche-Comté, December, 2006.
Bloch, M. R., S. W. McLaughlin, F. Patois, and J-M. Merolla, "Frequency-Coded Quantum Key Distribution", {O}ptics {L}etters, vol. 32, no. 3, pp. 301–303, February, 2007.
Bloch, M. R., "Achieving Secrecy: capacity vs. Resolvability", Proc. of IEEE International Symposium on Information Theory, Saint Petersburg, Russia, pp. 632–636, August, 2011.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Information Theoretic Security for Wireless Channels - Theory and Practice", Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, February, 2007.
Bloch, M. R., and A. Thangaraj, "Confidential Messages to a Cooperative Relay", Proc. of the IEEE Information Theory Workshop, Porto, Portugal, pp. 154–158, May, 2008.
Bloch, M. R., and J. Kliewer, "On secure communication with constrained randomization", Proc. IEEE International Symp.Information Theory, Cambridge, MA, pp. 1172–1176, July, 2012.
Boutros, J. J., V. Dedeoglu, and M. R. Bloch, "The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel", Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, February, 2014.
C
Cervia, G.., L.. Luzzi, M. R. Bloch, and M.. Le Treust, "Polar coding for empirical coordination of signals and actions over noisy channels", Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, pp. 81-85, September, 2016.
Chou, R. A., M. R. Bloch, and A. Yener, Universal Covertness for Discrete Memoryless Sources, , August, 2016.
Chou, R. A., M. R. Bloch, and J. Kliewer, "Polar Coding for Empirical and Strong Coordination via Distribution Approximation", Proc. IEEE International Symposium on Information Theory, pp. 1512 - 1516, June, 2015.
Chou, R. A., and M. R. Bloch, "Data compression with nearly uniform ouput", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 1979-1983, July, 2013.
Chou, R.. A., B.. N. Vellambi, M.. R. Bloch, and J.. Kliewer, "Coding Schemes for Achieving Strong Secrecy at Negligible Cost", IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1858-1873, October, 2017.
Chou, R. A., M. R. Bloch, and E. Abbe, "Polar Coding for Secret-Key Generation", IEEE Transactions on Information Theory, vol. 61, issue 11, November, 2015.
Chou, R. A., and M. R. Bloch, "Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation", IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4941–4957, August, 2014.
Chou, R. A., M. R. Bloch, and J. Kliewer, Empirical and Strong Coordination via Soft Covering with Polar Codes, , 2016.
Chou, R. A., and M. R. Bloch, "One-way rate-limited sequential key-distillation", Proc. IEEE International Symp.Information Theory, Cambridge, MA, pp. 1777–1781, July, 2012.
Chou, R. A., and M. R. Bloch, "Polar Coding for the Broadcast Channel with Confidential Messages", Proc. IEEE Information Theory Workshop, Jerusalem, Israel, IEEE, pp. 1-5, May, 2015.
Chou, R. A., and M. R. Bloch, "Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy", IEEE Transactions on Information Theory, vol. 62, issue 5, pp. 2410-2429, May, 2016.
Cussey, J., M. R. Bloch, A. Thangaraj, J-M. Merolla, and S. W. McLaughlin, "Integrated Direct-Modulation Based Quantum Cryptography System", Proc. Optical Network and Technologies, Pisa, Italy, IFIP, pp. 390–395, October, 2004.
Cussey, J., M. R. Bloch, A. Thangaraj, J-M. Merolla, and S. W. McLaughlin, "Direct-Modulation Scheme for Free-Space Quantum Cryptography", Proc. European Conference on Optical Communication, Stockholm, Sweden, September, 2004.
D
Diamanti, E., S. Fossier, J. Lodewyck, M. R. Bloch, R. Garcia-Patron, E. Karpov, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, et al., "Implementation of an all-fiber continuous variables quantum key distribution system", International Conference on Quantum Information Processing and Communication, Barcelona, Spain, October, 2007.
Donnet, S., A. Thangaraj, M. R. Bloch, J. Cussey, J-M. Merolla, and L. Larger, "Security of Y-00 under heterodyne measurement and fast correlation attack", {P}hysics {L}etters {A}, vol. 356, no. 6, pp. 406–410, August, 2006.
Donnet, S., A. Thangaraj, M. R. Bloch, J. Cussey, J-M. Merolla, and L. Larger, "Cryptanalysis of Y-00 under Heterodyne Measurement and Fast Correlation Attack", Proc. European Conference on Optical Communication, Cannes, France, pp. 1–2, September, 2006.
Dunn, B. P., M. R. Bloch, and N. J. Laneman, "Secure bits through queues", Proc. IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, pp. 37–41, June, 2009.
K
Kaimalettu, S., A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Constellation Shaping using LDPC Codes", Proc. IEEE International Symposium on Information Theory, Nice, France, pp. 2366–2370, June, 2007.
L
Larrousse, B., S. Lasaulce, and M. R. Bloch, Coordination in distributed networks via coded actions with application to power control, , October, 2014.
Le Treust, M., and M. R. Bloch, "Empirical Coordination, State Masking and State Amplification: Core of the Decoder's Knowledge", Proc. of IEEE International Symposium on Information Theory, pp. 895-899, July, 2016.
Li, N., B. Kim, V.. N. Chizhevsky, A.. Locquet, M. R. Bloch, D.. S. Citrin, and W. Pan, "Chaotic semiconductor lasers for ultrafast random bit generation", Proc. of Dynamics Days US, Atlanta, GA, pp. 23, January, 2014.
Li, N., B. Kim, V.. N. Chizhevsky, A.. Locquet, M. R. Bloch, D.. S. Citrin, and W. Pan, "Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser", {O}ptics {E}xpress, vol. 22, no. 6: OSA, pp. 6634–6646, March, 2014.
Li, N., B. Kim, V.. N. Chizhevsky, A. Locquet, M. R. Bloch, D. Citrin, and W. Pan, "Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser", Proc.of CLEO, San Jose, CA, pp. 1–2, June, 2014.
Ling, C., L. Luzzi, and M. R. Bloch, "Secret key generation from Gaussian sources using lattice hashing", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2621-2625, July, 2013.
Lodewyck, J.., M. R. Bloch, R.. Garcia-Patron, S.. Fossier, E.. Karpov, E.. Diamanti, T.. Debuisschert, N.. J. Cerf, R.. Tualle-Brouri, S. W. McLaughlin, et al., "Quantum key distribution device with coherent states", Proc. of SPIE Optics East, vol. 6780, Boston, MA, USA, pp. 67800Z/1-14, September, 2007.
Lodewyck, J., M. R. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, et al., "Quantum key distribution over 25 km with an all-fiber continuous-variable system", {P}hysical {R}eview {A}, vol. 76, pp. 042305/1-10, October, 2007.
Lodewyck, J., M. R. Bloch, S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, "Distribution quantique de clé a 25 km au moyen d'un dispositif fibré utilisant des variables continues", 10eme Colloque sur les Lasers et l'Optique Quantique, Grenoble, France, July, 2007.
Luzzi, L., and M. R. Bloch, "Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels", Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, pp. 641–647, May, 2011.
M
MolavianJazi, E., M. R. Bloch, and N. J. Laneman, "Arbitrary Jamming Can Preclude Secure Communications", Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 1069–1075, September, 2009.
P
Pierrot, A. J., and M. R. Bloch, "Strongly Secure Communications Over the Two-Way Wiretap Channel", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 3, pp. 595–605, September, 2011.
Pierrot, A. J., and M. R. Bloch, "LDPC-based coded cooperative jamming codes", Proc. of IEEE Information Theory Workshop, Lausanne, Switzerland, pp. 462–466, September, 2012.
Pierrot, A. J., and M. R. Bloch, "Joint Channel Intrinsic Randomness and Channel Resolvability", Proc. of Information Theory Workshop, Sevilla, Spain, pp. 1-5, April, 2013.
Pierrot, A. J., K. Suria Kuma Arumugam, and M. R. Bloch, "Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments", Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, April, 2013.
Pierrot, A. J., K. Suria Kuma Arumugam, and M. R. Bloch, The Effect of Eavesdropper's Statistics in Experimental Wireless Secret-Key Generation, , June, 2014.
R
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-blind Key-Agreement over MIMO Fading Channels", {IEEE} {T}ransactions on {C}ommunications, vol. 61, no. 2, pp. 620–627, February, 2013.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-Blind Key-Agreement over MIMO Quasi-Static Channels", Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, pp. 1–6, March, 2011.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-Blind Key-Agreement over MIMO Fading Channels", Proc. IEEE International Conference on Communications, Kyoto, Japan, pp. 1–6, June, 2011.
Renna, F., N. Laurenti, S. Tomasin, M. Baldi, N. Maturo, M. Bianchi, F. Chiaraluce, and M. R. Bloch, "Low-power secret key agreement over OFDM", Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budaptest, Hungary, pp. 43–48, April, 2013.
Rodrigues, M. R. D., A. Somekh-Baruch, and M. R. Bloch, "On Gaussian Wiretap Channels with Arbitrary Inputs", Proc. of European Wireless, Lucca, Italy, pp. 774–781, April, 2010.
S
Subramanian, A., A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 3, pp. 585–594, September, 2011.
Subramanian, A., A. T. Suresh, A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong and Weak Secrecy in Wiretap Channels", Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, pp. 30 - 34, September, 2010.
Suresh, A. T., A. Subramanian, A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong Secrecy for Erasure Wiretap Channels", Proc. IEEE Information Theory Workshop, Dublin, Ireland, September, 2010.
T
Tahmasbi, M., and M. R. Bloch, Second Order Asymptotics for Degraded Wiretap Channels: How Good Are Existing Codes?, , August, 2016.
Tahmasbi, M., and M. R. Bloch, "Second-Order Asymptotics of Covert Communications over Noisy Channels", Proc. of IEEE International Symposium on Information Theory, pp. 2224-2228, July, 2016.
Tan, V. Y. F., and M. R. Bloch, "Information spectrum approach to strong converse theorems for degraded wiretap channels", Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 747-754, September, 2014.
Tan, V. Y. F., and M. R. Bloch, "Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels", IEEE Transactions on Information Forensics and Security, vol. 10, issue 9, pp. 1891-1904, September, 2015.
V
Vellambi, B. N., J. Kliewer, and M. R. Bloch, "Strong Coordination over Multi-hop Line Networks", IEEE Information Theory Workshop, Jeju, South Korea, IEEE, pp. 192--196, October, 2015.
Vellambi, B. N., J. Kliewer, and M. R. Bloch, "Lossy Compression with Near-uniform Encoder Outputs", Proc. of IEEE International Symposium on Information Theory, pp. 530-534, July, 2016.
Vellambi, B. N., M. R. Bloch, R. A. Chou, and J. Kliewer, "Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?", Proc. IEEE International Symposium on Information Theory, Honk Kong, IEEE, pp. 2171-2175, June, 2015.
Vellambi, B.. N., J.. Kliewer, and M. R. Bloch, "Strong coordination over a line when actions are Markovian", Proc. of Annual Conference on Information Science and Systems, pp. 412-417, March, 2016.
Vellambi, B. N., J. Kliewer, and M. R. Bloch, Strong Coordination over Multi-hop Line Networks, , April, 2016.
Vilela, J. Paulo, M. R. Bloch, J. Barros, and S. W. McLaughlin, "Friendly Jamming for Wireless Secrecy", Proc. of IEEE International Conference on Communications, Cape Town, South Africa, pp. 1550-3607, May, 2010.
Vilela, J. Paulo, M. R. Bloch, J. Barros, and S. W. McLaughlin, "Wireless Secrecy Regions with Friendly Jamming", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 2, pp. 256–266, June, 2011.
W
Wong, T. F., M. R. Bloch, and J. M. Shea, "Secret Sharing over Fast-Fading MIMO Wiretap Channels", {EURASIP} {J}ournal on {W}ireless {C}ommunications and {N}etworking, vol. 2009, pp. 506973/1-17, 2009.