M Wiese, J Nötzel, H Boche - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
We give a complete characterization of the correlated random coding secrecy capacity of arbitrarily varying wiretap channels (AVWCs). We apply two alternative strong secrecy …
H ZivariFard, MR Bloch… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
This paper is eligible for the Jack Keil Wolf ISIT Student Paper Award. This paper investigates covert communication in the presence of a cooperative jammer. Covert …
We consider a communication problem in which a sender, Alice, wishes to communicate with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is …
M Wiese, H Boche - IEEE Transactions on Information Theory, 2020 - ieeexplore.ieee.org
A novel type of functions called biregular irreducible functions is introduced and applied as security components (instead of, eg, universal hash functions) in seeded modular wiretap …
We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all instances of CSI availability as …
We study communication in the presence of a jamming adversary where quadratic power constraints are imposed on the transmitter and the jammer. The jamming signal is allowed to …
This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals …
Y Chen, D He, C Ying, Y Luo - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The strong secrecy transmission problem of the arbitrarily varying wiretap channel (AVWC) with input and state constraints is investigated in this paper. First, a stochastic-encoder code …
We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non …