Publications

Export 95 results:
Author [ Type(Desc)] Year
Book Chapter
Bloch, M. R., "Physical Layer Security in Wireless Communications", Wireless Networks and Mobile Communications: CRC Press, pp. 1–26, 2013.
Conference Paper
Boutros, J. J., V. Dedeoglu, and M. R. Bloch, "The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel", Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, February, 2014.
Luzzi, L., and M. R. Bloch, "Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels", Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, pp. 641–647, May, 2011.
Bloch, M. R., "Channel Intrinsic Randomness", Proc. of IEEE International Symposium on Information Theory, Austin, TX, pp. 2607–2611, June, 2010.
Bloch, M. R., "Channel Scrambling for Secrecy", Proc. of IEEE International Symposium on Information Theory, Seoul, Korea, pp. 2452–2456, July, 2009.
Bloch, M. R., R. Narasimha, and S. W. McLaughlin, "Client-Server Architecture Design based on Wiretap Codes", Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, pp. 44–47, March, 2008.
Bloch, M. R., and A. Thangaraj, "Confidential Messages to a Cooperative Relay", Proc. of the IEEE Information Theory Workshop, Porto, Portugal, pp. 154–158, May, 2008.
Kaimalettu, S., A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Constellation Shaping using LDPC Codes", Proc. IEEE International Symposium on Information Theory, Nice, France, pp. 2366–2370, June, 2007.
Donnet, S., A. Thangaraj, M. R. Bloch, J. Cussey, J-M. Merolla, and L. Larger, "Cryptanalysis of Y-00 under Heterodyne Measurement and Fast Correlation Attack", Proc. European Conference on Optical Communication, Cannes, France, pp. 1–2, September, 2006.
Li, N., B. Kim, V.. N. Chizhevsky, A.. Locquet, M. R. Bloch, D.. S. Citrin, and W. Pan, "Chaotic semiconductor lasers for ultrafast random bit generation", Proc. of Dynamics Days US, Atlanta, GA, pp. 23, January, 2014.
Bloch, M. R., "Achieving Secrecy: capacity vs. Resolvability", Proc. of IEEE International Symposium on Information Theory, Saint Petersburg, Russia, pp. 632–636, August, 2011.
Cussey, J., M. R. Bloch, A. Thangaraj, J-M. Merolla, and S. W. McLaughlin, "Direct-Modulation Scheme for Free-Space Quantum Cryptography", Proc. European Conference on Optical Communication, Stockholm, Sweden, September, 2004.
Lodewyck, J., M. R. Bloch, S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, "Distribution quantique de clé a 25 km au moyen d'un dispositif fibré utilisant des variables continues", 10eme Colloque sur les Lasers et l'Optique Quantique, Grenoble, France, July, 2007.
Chou, R. A., and M. R. Bloch, "Data compression with nearly uniform ouput", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 1979-1983, July, 2013.
Le Treust, M., and M. R. Bloch, "Empirical Coordination, State Masking and State Amplification: Core of the Decoder's Knowledge", Proc. of IEEE International Symposium on Information Theory, pp. 895-899, July, 2016.
Pierrot, A. J., K. Suria Kuma Arumugam, and M. R. Bloch, "Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments", Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, April, 2013.
Vilela, J. Paulo, M. R. Bloch, J. Barros, and S. W. McLaughlin, "Friendly Jamming for Wireless Secrecy", Proc. of IEEE International Conference on Communications, Cape Town, South Africa, pp. 1550-3607, May, 2010.
Diamanti, E., S. Fossier, J. Lodewyck, M. R. Bloch, R. Garcia-Patron, E. Karpov, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, et al., "Implementation of an all-fiber continuous variables quantum key distribution system", International Conference on Quantum Information Processing and Communication, Barcelona, Spain, October, 2007.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Information Theoretic Security for Wireless Channels - Theory and Practice", Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, February, 2007.
Bloch, M. R., and N. J. Laneman, "Information-Spectrum Methods for Information-Theoretic Security", Proc. Information Theory and Applications Workshop, San Diego, CA, pp. 23–28, February, 2009.
Cussey, J., M. R. Bloch, A. Thangaraj, J-M. Merolla, and S. W. McLaughlin, "Integrated Direct-Modulation Based Quantum Cryptography System", Proc. Optical Network and Technologies, Pisa, Italy, IFIP, pp. 390–395, October, 2004.
Tan, V. Y. F., and M. R. Bloch, "Information spectrum approach to strong converse theorems for degraded wiretap channels", Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 747-754, September, 2014.
Pierrot, A. J., and M. R. Bloch, "Joint Channel Intrinsic Randomness and Channel Resolvability", Proc. of Information Theory Workshop, Sevilla, Spain, pp. 1-5, April, 2013.
Arumugam, K.. S. K., and M. R. Bloch, "Keyless asynchronous covert communication", Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, pp. 191-195, September, 2016.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Keyless Covert Communication over Multiple-Access Channels", Proc. of IEEE International Symposium on Information Theory, pp. 2229-2233, July, 2016.
Bloch, M. R., J.-M.. Merolla, S. W. McLaughlin, and J.-P.. Goedgebuer, "Long distance continuous variable transmission system using sideband detection method", First Russian-French Laser Physics Workshop for Young Scientists (RFLPW-YS), St. Petersburg, Russia, July, 2004.
Pierrot, A. J., and M. R. Bloch, "LDPC-based coded cooperative jamming codes", Proc. of IEEE Information Theory Workshop, Lausanne, Switzerland, pp. 462–466, September, 2012.
Bloch, M. R., A. Thangaraj, S. W. McLaughlin, and J-M. Merolla, "LDPC-based Gaussian Key Reconciliation", Proc. IEEE Information Theory Workshop, Punta del Este, Uruguay, pp. 116-120, March, 2006.
Bloch, M. R., A. Thangaraj, S. W. McLaughlin, and J-M. Merolla, "LDPC-based Secret Key Agreement over the Gaussian wiretap channel", Proc. IEEE International Symposium on Information Theory, Seattle, USA, pp. 1179-1183, July, 2006.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "LDPC-based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper's Channels", Proc. IEEE Information Theory Workshop, Chengdu, China, pp. 155-159, October, 2006.
Vellambi, B. N., J. Kliewer, and M. R. Bloch, "Lossy Compression with Near-uniform Encoder Outputs", Proc. of IEEE International Symposium on Information Theory, pp. 530-534, July, 2016.
Arumugam, K. Suria Kuma, M. R. Bloch, and J. Kliewer, "Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel", Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, pp. 466–470, November, 2014.
Renna, F., N. Laurenti, S. Tomasin, M. Baldi, N. Maturo, M. Bianchi, F. Chiaraluce, and M. R. Bloch, "Low-power secret key agreement over OFDM", Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budaptest, Hungary, pp. 43–48, April, 2013.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "An Opportunistic Physical-Layer Approach to Secure Wireless Communications", Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, pp. 849–854, September, 2006.
Rodrigues, M. R. D., A. Somekh-Baruch, and M. R. Bloch, "On Gaussian Wiretap Channels with Arbitrary Inputs", Proc. of European Wireless, Lucca, Italy, pp. 774–781, April, 2010.
Bloch, M. R., and N. J. Laneman, "On the Secrecy Capacity of Arbitrary Wiretap Channels", Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 818–825, September, 2008.
Chou, R. A., and M. R. Bloch, "One-way rate-limited sequential key-distillation", Proc. IEEE International Symp.Information Theory, Cambridge, MA, pp. 1777–1781, July, 2012.
Bloch, M. R., J. Barros, and S. W. McLaughlin, "Practical Information-Theoretic Commitment", Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, pp. 1035–1039, September, 2007.
Cervia, G.., L.. Luzzi, M. R. Bloch, and M.. Le Treust, "Polar coding for empirical coordination of signals and actions over noisy channels", Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, pp. 81-85, September, 2016.
Arumugam, K. Suria Kuma, M. R. Bloch, and E. Abbe, "Polar Coding for Secret-Key Generation", Proc. of Information Theory Workshop, Sevilla, Spain, pp. 1-5, April, 2013.
Lodewyck, J.., M. R. Bloch, R.. Garcia-Patron, S.. Fossier, E.. Karpov, E.. Diamanti, T.. Debuisschert, N.. J. Cerf, R.. Tualle-Brouri, S. W. McLaughlin, et al., "Quantum key distribution device with coherent states", Proc. of SPIE Optics East, vol. 6780, Boston, MA, USA, pp. 67800Z/1-14, September, 2007.
Fossier, S., J.. Lodewyck, E.. Diamanti, M. R. Bloch, T.. Debuisschert, R.. Tualle-Brouri, and P.. Grangier, "Quantum Key Distribution over 25 km Using a Fiber Setup Based on Continuous Variables", Proc. of CLEO/QELS, San Jose, CA, pp. 1–2, May, 2008.
MolavianJazi, E., M. R. Bloch, and N. J. Laneman, "Arbitrary Jamming Can Preclude Secure Communications", Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 1069–1075, September, 2009.
Dunn, B. P., M. R. Bloch, and N. J. Laneman, "Secure bits through queues", Proc. IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, pp. 37–41, June, 2009.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-Blind Key-Agreement over MIMO Fading Channels", Proc. IEEE International Conference on Communications, Kyoto, Japan, pp. 1–6, June, 2011.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-Blind Key-Agreement over MIMO Quasi-Static Channels", Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, pp. 1–6, March, 2011.
Subramanian, A., A. T. Suresh, A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong and Weak Secrecy in Wiretap Channels", Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, pp. 30 - 34, September, 2010.
Bloch, M. R., L. Luzzi, and J. Kliewer, "Strong Coordination with Polar Codes", Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 565-571, October, 2012.
Suresh, A. T., A. Subramanian, A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong Secrecy for Erasure Wiretap Channels", Proc. IEEE Information Theory Workshop, Dublin, Ireland, September, 2010.
Barros, J., and M. R. Bloch, "Strong Secrecy for Wireless Channels", Information Theoretic Security, Calgary, Canada, Springer Berlin / Heidelberg, pp. 40-53, August, 2008.
Tahmasbi, M., and M. R. Bloch, "Second-Order Asymptotics of Covert Communications over Noisy Channels", Proc. of IEEE International Symposium on Information Theory, pp. 2224-2228, July, 2016.
Ling, C., L. Luzzi, and M. R. Bloch, "Secret key generation from Gaussian sources using lattice hashing", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2621-2625, July, 2013.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel", Proc. of Global Conference on Signal and Information Processing, Austin, TX, pp. 277–280, September, 2013.
Bloch, M. R., and J. Kliewer, "On secure communication with constrained randomization", Proc. IEEE International Symp.Information Theory, Cambridge, MA, pp. 1172–1176, July, 2012.
Bloch, M. R., and J. Kliewer, "Strong coordination over a line network", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2319-2323, July, 2013.
Vellambi, B.. N., J.. Kliewer, and M. R. Bloch, "Strong coordination over a line when actions are Markovian", Proc. of Annual Conference on Information Science and Systems, pp. 412-417, March, 2016.
Bloch, M. R., and J. Kliewer, "Strong Coordination over a Three-Terminal Relay Network", Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, pp. 646–650, November, 2014.
Li, N., B. Kim, V.. N. Chizhevsky, A. Locquet, M. R. Bloch, D. Citrin, and W. Pan, "Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser", Proc.of CLEO, San Jose, CA, pp. 1–2, June, 2014.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Uniform Distributed Source Coding for the Multiple Access Wiretap Channel", Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, pp. 127–132, October, 2014.
Conference Proceedings
Bloch, M. R., "A Channel Resolvability Perpsective on Stealth Communications", IEEE International Symposium on Information Theory, Hong Kong, pp. 2535 - 2539, June, 2015.
Vellambi, B. N., M. R. Bloch, R. A. Chou, and J. Kliewer, "Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?", Proc. IEEE International Symposium on Information Theory, Honk Kong, IEEE, pp. 2171-2175, June, 2015.
Chou, R. A., M. R. Bloch, and J. Kliewer, "Polar Coding for Empirical and Strong Coordination via Distribution Approximation", Proc. IEEE International Symposium on Information Theory, pp. 1512 - 1516, June, 2015.
Chou, R. A., and M. R. Bloch, "Polar Coding for the Broadcast Channel with Confidential Messages", Proc. IEEE Information Theory Workshop, Jerusalem, Israel, IEEE, pp. 1-5, May, 2015.
Vellambi, B. N., J. Kliewer, and M. R. Bloch, "Strong Coordination over Multi-hop Line Networks", IEEE Information Theory Workshop, Jeju, South Korea, IEEE, pp. 192--196, October, 2015.
Journal Article
Harrison, W. K., J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security", {IEEE} {S}ignal {P}rocessing {M}agazine, vol. 30, no. 5, pp. 41–50, September, 2013.
Chou, R.. A., B.. N. Vellambi, M.. R. Bloch, and J.. Kliewer, "Coding Schemes for Achieving Strong Secrecy at Negligible Cost", IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1858-1873, October, 2017.
Bassily, R., E. Ekrem, X. He, E. Tekin, J. Xie, M. R. Bloch, S. Ulukus, and A. Yener, "Cooperative Security at the Physical Layer: A Summary of Recent Advances", {IEEE} {S}ignal {P}rocessing {M}agazine, vol. 30, no. 5, pp. 16–28, September, 2013.
Bloch, M. R., "Covert Communication over Noisy Channels: A Resolvability Perspective", IEEE Transactions on Information Theory, vol. 62, issue 5, pp. 2334-2354, May, 2016.
Bloch, M. R., M. Hayashi, and A. Thangaraj, "Error-Control Coding for Physical-Layer Secrecy", Proceedings of IEEE, vol. 103, issue 10, pp. 1725-1746, October, 2015.
Bloch, M. R., and N. J. Laneman, "Exploiting Partial Channel State Information for Secrecy over Wireless Channels", {IEEE} {J}ournal on {S}elected {A}reas in {C}ommunications, vol. 31, no. 9, pp. 1840-1849, September, 2013.
Bloch, M. R., S. W. McLaughlin, F. Patois, and J-M. Merolla, "Frequency-Coded Quantum Key Distribution", {O}ptics {L}etters, vol. 32, no. 3, pp. 301–303, February, 2007.
Tan, V. Y. F., and M. R. Bloch, "Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels", IEEE Transactions on Information Forensics and Security, vol. 10, issue 9, pp. 1891-1904, September, 2015.
Bloch, M. R., R. Narasimha, and S. W. McLaughlin, "Network Security for Client-Server Architecture using Wiretap Codes", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 3, no. 3, pp. 404–413, September, 2008.
Chou, R. A., M. R. Bloch, and E. Abbe, "Polar Coding for Secret-Key Generation", IEEE Transactions on Information Theory, vol. 61, issue 11, November, 2015.
Chou, R. A., and M. R. Bloch, "Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy", IEEE Transactions on Information Theory, vol. 62, issue 5, pp. 2410-2429, May, 2016.
Lodewyck, J., M. R. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, et al., "Quantum key distribution over 25 km with an all-fiber continuous-variable system", {P}hysical {R}eview {A}, vol. 76, pp. 042305/1-10, October, 2007.
Wong, T. F., M. R. Bloch, and J. M. Shea, "Secret Sharing over Fast-Fading MIMO Wiretap Channels", {EURASIP} {J}ournal on {W}ireless {C}ommunications and {N}etworking, vol. 2009, pp. 506973/1-17, 2009.
Donnet, S., A. Thangaraj, M. R. Bloch, J. Cussey, J-M. Merolla, and L. Larger, "Security of Y-00 under heterodyne measurement and fast correlation attack", {P}hysics {L}etters {A}, vol. 356, no. 6, pp. 406–410, August, 2006.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-blind Key-Agreement over MIMO Fading Channels", {IEEE} {T}ransactions on {C}ommunications, vol. 61, no. 2, pp. 620–627, February, 2013.
Subramanian, A., A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 3, pp. 585–594, September, 2011.
Pierrot, A. J., and M. R. Bloch, "Strongly Secure Communications Over the Two-Way Wiretap Channel", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 3, pp. 595–605, September, 2011.
Chou, R. A., and M. R. Bloch, "Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation", IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4941–4957, August, 2014.
Bloch, M. R., and N. J. Laneman, "Strong Secrecy from Channel Resolvability", {IEEE} {T}ransactions on {I}nformation {T}heory, vol. 59, no. 12, pp. 8077-8098, December, 2013.
Li, N., B. Kim, V.. N. Chizhevsky, A.. Locquet, M. R. Bloch, D.. S. Citrin, and W. Pan, "Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser", {O}ptics {E}xpress, vol. 22, no. 6: OSA, pp. 6634–6646, March, 2014.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security", {IEEE} {T}rans. {I}nf. {T}heory, vol. 54, no. 6, pp. 2515–2534, June, 2008.
Vilela, J. Paulo, M. R. Bloch, J. Barros, and S. W. McLaughlin, "Wireless Secrecy Regions with Friendly Jamming", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 2, pp. 256–266, June, 2011.