Wireless information-theoretic security M Bloch, J Barros, MRD Rodrigues, SW McLaughlin Information Theory, IEEE Transactions on 54 (6), 2515-2534, 2008 | 2061 | 2008 |
Physical-Layer Security: From Information Theory to Security Engineering M Bloch, J Barros Cambridge Univ Pr, 2011 | 1462 | 2011 |
Quantum key distribution over 25 km with an all-fiber continuous-variable system J Lodewyck, M Bloch, R García-Patrón, S Fossier, E Karpov, E Diamanti, ... Physical Review A 76 (4), 042305, 2007 | 584 | 2007 |
Covert communication over noisy channels: A resolvability perspective MR Bloch IEEE Transactions on Information Theory 62 (5), 2334-2354, 2016 | 372 | 2016 |
Cooperative security at the physical layer: A summary of recent advances R Bassily, E Ekrem, X He, E Tekin, J Xie, MR Bloch, S Ulukus, A Yener IEEE Signal Processing Magazine 30 (5), 16-28, 2013 | 237 | 2013 |
Strong secrecy from channel resolvability MR Bloch, JN Laneman IEEE Transactions on Information Theory 59 (12), 8077-8098, 2013 | 224 | 2013 |
Coding for secrecy: An overview of error-control coding techniques for physical-layer security WK Harrison, J Almeida, MR Bloch, SW McLaughlin, J Barros IEEE Signal Processing Magazine 30 (5), 41-50, 2013 | 219 | 2013 |
Wireless secrecy regions with friendly jamming JP Vilela, M Bloch, J Barros, SW McLaughlin IEEE Transactions on Information Forensics and Security 6 (2), 256-266, 2011 | 215 | 2011 |
Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser N Li, B Kim, VN Chizhevsky, A Locquet, M Bloch, DS Citrin, W Pan Optics express 22 (6), 6634-6646, 2014 | 141 | 2014 |
Polar coding for secret-key generation RA Chou, MR Bloch, E Abbe IEEE Transactions on Information Theory 61 (11), 6213-6237, 2015 | 131 | 2015 |
Frequency-coded quantum key distribution M Bloch, SW McLaughlin, JM Merolla, F Patois Optics letters 32 (3), 301-303, 2007 | 122 | 2007 |
Error-control coding for physical-layer secrecy M Bloch, M Hayashi, A Thangaraj Proceedings of the IEEE 103 (10), 1725-1746, 2015 | 117 | 2015 |
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes A Subramanian, A Thangaraj, M Bloch, SW McLaughlin IEEE Transactions on Information Forensics and Security 6 (3), 585-594, 2011 | 112 | 2011 |
LDPC-based Gaussian key reconciliation M Bloch, A Thangaraj, SW McLaughlin, JM Merolla Information Theory Workshop, 2006. ITW'06 Punta del Este. IEEE, 116-120, 2006 | 102* | 2006 |
First-and second-order asymptotics in covert communication M Tahmasbi, MR Bloch IEEE Transactions on Information Theory 65 (4), 2190-2212, 2018 | 99 | 2018 |
Polar coding for the broadcast channel with confidential messages: A random binning analogy RA Chou, MR Bloch IEEE Transactions on Information Theory 62 (5), 2410-2429, 2016 | 96* | 2016 |
An overview of information-theoretic security and privacy: Metrics, limits and applications M Bloch, O Günlü, A Yener, F Oggier, HV Poor, L Sankar, RF Schaefer IEEE Journal on Selected Areas in Information Theory 2 (1), 5-22, 2021 | 94 | 2021 |
On the secrecy capacity of arbitrary wiretap channels M Bloch, JN Laneman 2008 46th Annual Allerton Conference on Communication, Control, and …, 2008 | 85 | 2008 |
Strongly secure communications over the two-way wiretap channel AJ Pierrot, MR Bloch IEEE Transactions on Information Forensics and Security 6 (3), 595-605, 2011 | 80 | 2011 |
Keyless covert communication over multiple-access channels KSK Arumugam, MR Bloch 2016 IEEE International Symposium on Information Theory (ISIT), 2229-2233, 2016 | 78 | 2016 |