Physical layer insecurity

M Médard, KR Duffy - 2023 57th Annual Conference on …, 2023 - ieeexplore.ieee.org
In the classic wiretap model, Alice wishes to reliably communicate to Bob without being
overheard by Eve who is eavesdropping over a degraded channel. Systems for achieving …

Practical Wiretap Code Design by Concatenated Autoencoder and LDPC Codes

S Lyu, R Raghunath, L Kunz, KL Besser… - … and Security (WIFS), 2023 - ieeexplore.ieee.org
Practical wiretap code design for reliable and confidential communication is a difficult multi-
objective task. In literature, neural networks (NN) have been designed as channel encoders …

Gaussian multiuser wiretap channels in the presence of a jammer-aided eavesdropper

RA Chou, A Yener - Entropy, 2022 - mdpi.com
This paper considers secure communication in the presence of an eavesdropper and a
malicious jammer. The jammer is assumed to be oblivious of the communication signals …

Characterization of the Complexity of Computing the Capacity of Colored Noise Gaussian Channels

H Boche, A Grigorescu, RF Schaefer… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper explores the computational complexity involved in determining the capacity of the
band-limited additive colored Gaussian noise (ACGN) channel and its capacity-achieving …

Soft detection physical layer insecurity

KR Duffy, M Médard - GLOBECOM 2023-2023 IEEE Global …, 2023 - ieeexplore.ieee.org
We establish that during the execution of any Guessing Random Additive Noise Decoding
(GRAND) algorithm, an interpretable, useful measure of decoding confidence can be …

Secret sharing over a Gaussian broadcast channel: Optimal coding scheme design and deep learning approach at short blocklength

R Sultana, V Rana, RA Chou - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Consider a secret sharing model where a dealer shares a secret with several participants
through a Gaussian broadcast channel such that predefined subsets of participants can …

Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming

A Nikkhah, M Shoushtari, B Akhbari… - arXiv preprint arXiv …, 2024 - arxiv.org
In this paper, we use a linear programming (LP) optimization approach to evaluate the
equivocation for a wiretap channel where the main channel is noiseless, and the wiretap …

Lattices and codes for wireless communications and security

L Luzzi - 2023 - theses.hal.science
The many challenges posed by the evolution of communication systems often require an
interdisciplinary approach. In particular, discrete mathematics, algebra and number theory …

Cryptographic Key Extraction and Neural Leakage Estimation

D Bergström - 2024 - diva-portal.org
We investigate the extraction of cryptographic keying material from nano-scale variations of
digital circuit outputs by using nested polar codes and neural leakage estimators. A runtime …