Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Wiretap channels: Nonasymptotic fundamental limits
This paper investigates the maximal secret communication rate over a wiretap channel
subject to reliability and secrecy constraints at a given blocklength. New achievability and …
subject to reliability and secrecy constraints at a given blocklength. New achievability and …
Asymptotic estimates in information theory with non-vanishing error probabilities
VYF Tan - Foundations and Trends® in Communications and …, 2014 - nowpublishers.com
This monograph presents a unified treatment of single-and multi-user problems in
Shannon's information theory where we depart from the requirement that the error …
Shannon's information theory where we depart from the requirement that the error …
When are fuzzy extractors possible?
Fuzzy extractors (Dodis et al., SIAM J. Computing 2008) convert repeated noisy readings of
a high-entropy secret into the same uniformly distributed key. A minimum condition for the …
a high-entropy secret into the same uniformly distributed key. A minimum condition for the …
Communication for generating correlation: A unifying survey
The task of manipulating correlated random variables in a distributed setting has received
attention in the fields of both Information Theory and Computer Science. Often shared …
attention in the fields of both Information Theory and Computer Science. Often shared …
Converses for secret key agreement and secure computing
We consider information theoretic secret key (SK) agreement and secure function
computation by multiple parties observing correlated data, with access to an interactive …
computation by multiple parties observing correlated data, with access to an interactive …
[BOK][B] Information-theoretic Cryptography
H Tyagi, S Watanabe - 2023 - books.google.com
This book offers a mathematical foundation for modern cryptography. It is primarily intended
as an introduction for graduate students. Readers should have basic knowledge of …
as an introduction for graduate students. Readers should have basic knowledge of …
Universal hashing for information-theoretic security
The information-theoretic approach to security entails harnessing the correlated
randomness available in nature to establish security. It uses tools from information theory …
randomness available in nature to establish security. It uses tools from information theory …
Strong converse using change of measure arguments
The strong converse for a coding theorem shows that the optimal asymptotic rate possible
with vanishing error cannot be improved by allowing a fixed error. Building on a method …
with vanishing error cannot be improved by allowing a fixed error. Building on a method …
Multiterminal secrecy by public discussion
P Narayan, H Tyagi - Foundations and Trends® in …, 2016 - nowpublishers.com
This monograph describes principles of information theoretic secrecy generation by
legitimate parties with public discussion in the presence of an eavesdropper. The parties are …
legitimate parties with public discussion in the presence of an eavesdropper. The parties are …
Information theory from a functional viewpoint
J Liu - 2018 - search.proquest.com
A perennial theme of information theory is to find new methods to determine the fundamental
limits of various communication systems, which potentially helps the engineers to find better …
limits of various communication systems, which potentially helps the engineers to find better …