Publications

Export 95 results:
Author Type [ Year(Desc)]
2004
Cussey, J., M. R. Bloch, A. Thangaraj, J-M. Merolla, and S. W. McLaughlin, "Direct-Modulation Scheme for Free-Space Quantum Cryptography", Proc. European Conference on Optical Communication, Stockholm, Sweden, September, 2004.
Cussey, J., M. R. Bloch, A. Thangaraj, J-M. Merolla, and S. W. McLaughlin, "Integrated Direct-Modulation Based Quantum Cryptography System", Proc. Optical Network and Technologies, Pisa, Italy, IFIP, pp. 390–395, October, 2004.
Bloch, M. R., J.-M.. Merolla, S. W. McLaughlin, and J.-P.. Goedgebuer, "Long distance continuous variable transmission system using sideband detection method", First Russian-French Laser Physics Workshop for Young Scientists (RFLPW-YS), St. Petersburg, Russia, July, 2004.
2006
Donnet, S., A. Thangaraj, M. R. Bloch, J. Cussey, J-M. Merolla, and L. Larger, "Cryptanalysis of Y-00 under Heterodyne Measurement and Fast Correlation Attack", Proc. European Conference on Optical Communication, Cannes, France, pp. 1–2, September, 2006.
Bloch, M. R., A. Thangaraj, S. W. McLaughlin, and J-M. Merolla, "LDPC-based Gaussian Key Reconciliation", Proc. IEEE Information Theory Workshop, Punta del Este, Uruguay, pp. 116-120, March, 2006.
Bloch, M. R., A. Thangaraj, S. W. McLaughlin, and J-M. Merolla, "LDPC-based Secret Key Agreement over the Gaussian wiretap channel", Proc. IEEE International Symposium on Information Theory, Seattle, USA, pp. 1179-1183, July, 2006.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "LDPC-based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper's Channels", Proc. IEEE Information Theory Workshop, Chengdu, China, pp. 155-159, October, 2006.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "An Opportunistic Physical-Layer Approach to Secure Wireless Communications", Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, pp. 849–854, September, 2006.
Bloch, M. R., Reconciliation algorithm and quantum key distribution methods adapted for the frequency domain, : {Université de Franche-Comté, December, 2006.
Donnet, S., A. Thangaraj, M. R. Bloch, J. Cussey, J-M. Merolla, and L. Larger, "Security of Y-00 under heterodyne measurement and fast correlation attack", {P}hysics {L}etters {A}, vol. 356, no. 6, pp. 406–410, August, 2006.
2007
Kaimalettu, S., A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Constellation Shaping using LDPC Codes", Proc. IEEE International Symposium on Information Theory, Nice, France, pp. 2366–2370, June, 2007.
Lodewyck, J., M. R. Bloch, S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, "Distribution quantique de clé a 25 km au moyen d'un dispositif fibré utilisant des variables continues", 10eme Colloque sur les Lasers et l'Optique Quantique, Grenoble, France, July, 2007.
Bloch, M. R., S. W. McLaughlin, F. Patois, and J-M. Merolla, "Frequency-Coded Quantum Key Distribution", {O}ptics {L}etters, vol. 32, no. 3, pp. 301–303, February, 2007.
Diamanti, E., S. Fossier, J. Lodewyck, M. R. Bloch, R. Garcia-Patron, E. Karpov, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, et al., "Implementation of an all-fiber continuous variables quantum key distribution system", International Conference on Quantum Information Processing and Communication, Barcelona, Spain, October, 2007.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Information Theoretic Security for Wireless Channels - Theory and Practice", Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, February, 2007.
Bloch, M. R., J. Barros, and S. W. McLaughlin, "Practical Information-Theoretic Commitment", Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, pp. 1035–1039, September, 2007.
Lodewyck, J.., M. R. Bloch, R.. Garcia-Patron, S.. Fossier, E.. Karpov, E.. Diamanti, T.. Debuisschert, N.. J. Cerf, R.. Tualle-Brouri, S. W. McLaughlin, et al., "Quantum key distribution device with coherent states", Proc. of SPIE Optics East, vol. 6780, Boston, MA, USA, pp. 67800Z/1-14, September, 2007.
Lodewyck, J., M. R. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, et al., "Quantum key distribution over 25 km with an all-fiber continuous-variable system", {P}hysical {R}eview {A}, vol. 76, pp. 042305/1-10, October, 2007.
2008
Bloch, M. R., R. Narasimha, and S. W. McLaughlin, "Client-Server Architecture Design based on Wiretap Codes", Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, pp. 44–47, March, 2008.
Bloch, M. R., and A. Thangaraj, "Confidential Messages to a Cooperative Relay", Proc. of the IEEE Information Theory Workshop, Porto, Portugal, pp. 154–158, May, 2008.
Bloch, M. R., R. Narasimha, and S. W. McLaughlin, "Network Security for Client-Server Architecture using Wiretap Codes", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 3, no. 3, pp. 404–413, September, 2008.
Bloch, M. R., and N. J. Laneman, "On the Secrecy Capacity of Arbitrary Wiretap Channels", Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 818–825, September, 2008.
Bloch, M. R., Physical-Layer Security, : Georgia Institute of Technology, August, 2008.
Fossier, S., J.. Lodewyck, E.. Diamanti, M. R. Bloch, T.. Debuisschert, R.. Tualle-Brouri, and P.. Grangier, "Quantum Key Distribution over 25 km Using a Fiber Setup Based on Continuous Variables", Proc. of CLEO/QELS, San Jose, CA, pp. 1–2, May, 2008.
Barros, J., and M. R. Bloch, "Strong Secrecy for Wireless Channels", Information Theoretic Security, Calgary, Canada, Springer Berlin / Heidelberg, pp. 40-53, August, 2008.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security", {IEEE} {T}rans. {I}nf. {T}heory, vol. 54, no. 6, pp. 2515–2534, June, 2008.
2009
Bloch, M. R., "Channel Scrambling for Secrecy", Proc. of IEEE International Symposium on Information Theory, Seoul, Korea, pp. 2452–2456, July, 2009.
Bloch, M. R., and N. J. Laneman, "Information-Spectrum Methods for Information-Theoretic Security", Proc. Information Theory and Applications Workshop, San Diego, CA, pp. 23–28, February, 2009.
MolavianJazi, E., M. R. Bloch, and N. J. Laneman, "Arbitrary Jamming Can Preclude Secure Communications", Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 1069–1075, September, 2009.
Wong, T. F., M. R. Bloch, and J. M. Shea, "Secret Sharing over Fast-Fading MIMO Wiretap Channels", {EURASIP} {J}ournal on {W}ireless {C}ommunications and {N}etworking, vol. 2009, pp. 506973/1-17, 2009.
Dunn, B. P., M. R. Bloch, and N. J. Laneman, "Secure bits through queues", Proc. IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, pp. 37–41, June, 2009.
2010
Bloch, M. R., "Channel Intrinsic Randomness", Proc. of IEEE International Symposium on Information Theory, Austin, TX, pp. 2607–2611, June, 2010.
Vilela, J. Paulo, M. R. Bloch, J. Barros, and S. W. McLaughlin, "Friendly Jamming for Wireless Secrecy", Proc. of IEEE International Conference on Communications, Cape Town, South Africa, pp. 1550-3607, May, 2010.
Rodrigues, M. R. D., A. Somekh-Baruch, and M. R. Bloch, "On Gaussian Wiretap Channels with Arbitrary Inputs", Proc. of European Wireless, Lucca, Italy, pp. 774–781, April, 2010.
Subramanian, A., A. T. Suresh, A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong and Weak Secrecy in Wiretap Channels", Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, pp. 30 - 34, September, 2010.
Suresh, A. T., A. Subramanian, A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong Secrecy for Erasure Wiretap Channels", Proc. IEEE Information Theory Workshop, Dublin, Ireland, September, 2010.
2011
Luzzi, L., and M. R. Bloch, "Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels", Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, pp. 641–647, May, 2011.
Bloch, M. R., "Achieving Secrecy: capacity vs. Resolvability", Proc. of IEEE International Symposium on Information Theory, Saint Petersburg, Russia, pp. 632–636, August, 2011.
Bloch, M. R., and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering, : Cambridge University Press, October, 2011.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-Blind Key-Agreement over MIMO Fading Channels", Proc. IEEE International Conference on Communications, Kyoto, Japan, pp. 1–6, June, 2011.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-Blind Key-Agreement over MIMO Quasi-Static Channels", Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, pp. 1–6, March, 2011.
Subramanian, A., A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 3, pp. 585–594, September, 2011.
Pierrot, A. J., and M. R. Bloch, "Strongly Secure Communications Over the Two-Way Wiretap Channel", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 3, pp. 595–605, September, 2011.
Vilela, J. Paulo, M. R. Bloch, J. Barros, and S. W. McLaughlin, "Wireless Secrecy Regions with Friendly Jamming", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 2, pp. 256–266, June, 2011.
2012
Pierrot, A. J., and M. R. Bloch, "LDPC-based coded cooperative jamming codes", Proc. of IEEE Information Theory Workshop, Lausanne, Switzerland, pp. 462–466, September, 2012.
Chou, R. A., and M. R. Bloch, "One-way rate-limited sequential key-distillation", Proc. IEEE International Symp.Information Theory, Cambridge, MA, pp. 1777–1781, July, 2012.
Bloch, M. R., L. Luzzi, and J. Kliewer, "Strong Coordination with Polar Codes", Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 565-571, October, 2012.
Bloch, M. R., and J. Kliewer, "On secure communication with constrained randomization", Proc. IEEE International Symp.Information Theory, Cambridge, MA, pp. 1172–1176, July, 2012.
2013
Harrison, W. K., J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security", {IEEE} {S}ignal {P}rocessing {M}agazine, vol. 30, no. 5, pp. 41–50, September, 2013.
Bassily, R., E. Ekrem, X. He, E. Tekin, J. Xie, M. R. Bloch, S. Ulukus, and A. Yener, "Cooperative Security at the Physical Layer: A Summary of Recent Advances", {IEEE} {S}ignal {P}rocessing {M}agazine, vol. 30, no. 5, pp. 16–28, September, 2013.
Chou, R. A., and M. R. Bloch, "Data compression with nearly uniform ouput", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 1979-1983, July, 2013.
Pierrot, A. J., K. Suria Kuma Arumugam, and M. R. Bloch, "Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments", Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, April, 2013.
Bloch, M. R., and N. J. Laneman, "Exploiting Partial Channel State Information for Secrecy over Wireless Channels", {IEEE} {J}ournal on {S}elected {A}reas in {C}ommunications, vol. 31, no. 9, pp. 1840-1849, September, 2013.
Pierrot, A. J., and M. R. Bloch, "Joint Channel Intrinsic Randomness and Channel Resolvability", Proc. of Information Theory Workshop, Sevilla, Spain, pp. 1-5, April, 2013.
Renna, F., N. Laurenti, S. Tomasin, M. Baldi, N. Maturo, M. Bianchi, F. Chiaraluce, and M. R. Bloch, "Low-power secret key agreement over OFDM", Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budaptest, Hungary, pp. 43–48, April, 2013.
Bloch, M. R., "Physical Layer Security in Wireless Communications", Wireless Networks and Mobile Communications: CRC Press, pp. 1–26, 2013.
Arumugam, K. Suria Kuma, M. R. Bloch, and E. Abbe, "Polar Coding for Secret-Key Generation", Proc. of Information Theory Workshop, Sevilla, Spain, pp. 1-5, April, 2013.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-blind Key-Agreement over MIMO Fading Channels", {IEEE} {T}ransactions on {C}ommunications, vol. 61, no. 2, pp. 620–627, February, 2013.
Ling, C., L. Luzzi, and M. R. Bloch, "Secret key generation from Gaussian sources using lattice hashing", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2621-2625, July, 2013.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel", Proc. of Global Conference on Signal and Information Processing, Austin, TX, pp. 277–280, September, 2013.
Bloch, M. R., and J. Kliewer, "Strong coordination over a line network", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2319-2323, July, 2013.
Bloch, M. R., and N. J. Laneman, "Strong Secrecy from Channel Resolvability", {IEEE} {T}ransactions on {I}nformation {T}heory, vol. 59, no. 12, pp. 8077-8098, December, 2013.
2014
Boutros, J. J., V. Dedeoglu, and M. R. Bloch, "The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel", Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, February, 2014.
Li, N., B. Kim, V.. N. Chizhevsky, A.. Locquet, M. R. Bloch, D.. S. Citrin, and W. Pan, "Chaotic semiconductor lasers for ultrafast random bit generation", Proc. of Dynamics Days US, Atlanta, GA, pp. 23, January, 2014.
Larrousse, B., S. Lasaulce, and M. R. Bloch, Coordination in distributed networks via coded actions with application to power control, , October, 2014.
Pierrot, A. J., K. Suria Kuma Arumugam, and M. R. Bloch, The Effect of Eavesdropper's Statistics in Experimental Wireless Secret-Key Generation, , June, 2014.
Tan, V. Y. F., and M. R. Bloch, "Information spectrum approach to strong converse theorems for degraded wiretap channels", Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 747-754, September, 2014.
Arumugam, K. Suria Kuma, M. R. Bloch, and J. Kliewer, "Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel", Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, pp. 466–470, November, 2014.
Chou, R. A., and M. R. Bloch, "Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation", IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4941–4957, August, 2014.
Bloch, M. R., and J. Kliewer, "Strong Coordination over a Three-Terminal Relay Network", Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, pp. 646–650, November, 2014.
Li, N., B. Kim, V.. N. Chizhevsky, A.. Locquet, M. R. Bloch, D.. S. Citrin, and W. Pan, "Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser", {O}ptics {E}xpress, vol. 22, no. 6: OSA, pp. 6634–6646, March, 2014.
Li, N., B. Kim, V.. N. Chizhevsky, A. Locquet, M. R. Bloch, D. Citrin, and W. Pan, "Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser", Proc.of CLEO, San Jose, CA, pp. 1–2, June, 2014.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Uniform Distributed Source Coding for the Multiple Access Wiretap Channel", Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, pp. 127–132, October, 2014.
2015
Bloch, M. R., "A Channel Resolvability Perpsective on Stealth Communications", IEEE International Symposium on Information Theory, Hong Kong, pp. 2535 - 2539, June, 2015.
Bloch, M. R., M. Hayashi, and A. Thangaraj, "Error-Control Coding for Physical-Layer Secrecy", Proceedings of IEEE, vol. 103, issue 10, pp. 1725-1746, October, 2015.
Tan, V. Y. F., and M. R. Bloch, "Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels", IEEE Transactions on Information Forensics and Security, vol. 10, issue 9, pp. 1891-1904, September, 2015.
Vellambi, B. N., M. R. Bloch, R. A. Chou, and J. Kliewer, "Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?", Proc. IEEE International Symposium on Information Theory, Honk Kong, IEEE, pp. 2171-2175, June, 2015.
Chou, R. A., M. R. Bloch, and J. Kliewer, "Polar Coding for Empirical and Strong Coordination via Distribution Approximation", Proc. IEEE International Symposium on Information Theory, pp. 1512 - 1516, June, 2015.
Chou, R. A., M. R. Bloch, and E. Abbe, "Polar Coding for Secret-Key Generation", IEEE Transactions on Information Theory, vol. 61, issue 11, November, 2015.
Chou, R. A., and M. R. Bloch, "Polar Coding for the Broadcast Channel with Confidential Messages", Proc. IEEE Information Theory Workshop, Jerusalem, Israel, IEEE, pp. 1-5, May, 2015.
Vellambi, B. N., J. Kliewer, and M. R. Bloch, "Strong Coordination over Multi-hop Line Networks", IEEE Information Theory Workshop, Jeju, South Korea, IEEE, pp. 192--196, October, 2015.
2016
Bloch, M. R., "Covert Communication over Noisy Channels: A Resolvability Perspective", IEEE Transactions on Information Theory, vol. 62, issue 5, pp. 2334-2354, May, 2016.
Chou, R. A., M. R. Bloch, and J. Kliewer, Empirical and Strong Coordination via Soft Covering with Polar Codes, , 2016.
Le Treust, M., and M. R. Bloch, "Empirical Coordination, State Masking and State Amplification: Core of the Decoder's Knowledge", Proc. of IEEE International Symposium on Information Theory, pp. 895-899, July, 2016.
Arumugam, K.. S. K., and M. R. Bloch, "Keyless asynchronous covert communication", Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, pp. 191-195, September, 2016.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Keyless Covert Communication over Multiple-Access Channels", Proc. of IEEE International Symposium on Information Theory, pp. 2229-2233, July, 2016.
Vellambi, B. N., J. Kliewer, and M. R. Bloch, "Lossy Compression with Near-uniform Encoder Outputs", Proc. of IEEE International Symposium on Information Theory, pp. 530-534, July, 2016.
Cervia, G.., L.. Luzzi, M. R. Bloch, and M.. Le Treust, "Polar coding for empirical coordination of signals and actions over noisy channels", Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, pp. 81-85, September, 2016.
Chou, R. A., and M. R. Bloch, "Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy", IEEE Transactions on Information Theory, vol. 62, issue 5, pp. 2410-2429, May, 2016.
Tahmasbi, M., and M. R. Bloch, Second Order Asymptotics for Degraded Wiretap Channels: How Good Are Existing Codes?, , August, 2016.
Tahmasbi, M., and M. R. Bloch, "Second-Order Asymptotics of Covert Communications over Noisy Channels", Proc. of IEEE International Symposium on Information Theory, pp. 2224-2228, July, 2016.
Vellambi, B.. N., J.. Kliewer, and M. R. Bloch, "Strong coordination over a line when actions are Markovian", Proc. of Annual Conference on Information Science and Systems, pp. 412-417, March, 2016.
Vellambi, B. N., J. Kliewer, and M. R. Bloch, Strong Coordination over Multi-hop Line Networks, , April, 2016.
Chou, R. A., M. R. Bloch, and A. Yener, Universal Covertness for Discrete Memoryless Sources, , August, 2016.
2017
Chou, R.. A., B.. N. Vellambi, M.. R. Bloch, and J.. Kliewer, "Coding Schemes for Achieving Strong Secrecy at Negligible Cost", IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1858-1873, October, 2017.