Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Polar coding for secret-key generation
Practical implementations of secret-key generation are often based on sequential strategies,
which handle reliability and secrecy in two successive steps, called reconciliation and …
which handle reliability and secrecy in two successive steps, called reconciliation and …
Challenges and some new directions in channel coding
Challenges and some new directions in channel coding Page 1 328 JOURNAL OF
COMMUNICATIONS AND NETWORKS, VOL. 17, NO. 4, AUGUST 2015 Challenges and …
COMMUNICATIONS AND NETWORKS, VOL. 17, NO. 4, AUGUST 2015 Challenges and …
A robust SRAM-PUF key generation scheme based on polar codes
Physical unclonable functions (PUFs) are relatively new security primitives used for device
authentication and device-specific secret key generation. In this paper we focus on SRAM …
authentication and device-specific secret key generation. In this paper we focus on SRAM …
Secret key generation over biased physical unclonable functions with polar codes
Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources,
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …
Sparse regression codes
R Venkataramanan, S Tatikonda… - … and Trends® in …, 2019 - nowpublishers.com
Develo** computationally-efficient codes that approach the Shannon-theoretic limits for
communication and compression has long been one of the major goals of information and …
communication and compression has long been one of the major goals of information and …
Universal hashing for information-theoretic security
The information-theoretic approach to security entails harnessing the correlated
randomness available in nature to establish security. It uses tools from information theory …
randomness available in nature to establish security. It uses tools from information theory …
Polar coding for bidirectional broadcast channels with common and confidential messages
The integration of multiple services such as the transmission of private, common, and
confidential messages at the physical layer is becoming important for future wireless …
confidential messages at the physical layer is becoming important for future wireless …
Polar-code-based information reconciliation scheme with the frozen-bit erasure strategy for quantum key distribution
BY Tang, CQ Wu, W Peng, B Liu, WR Yu - Physical Review A, 2023 - APS
Information reconciliation (IR) ensures the correctness of quantum key distribution systems
by correcting the error bits that existed in the sifted keys. In this article, we propose a polar …
by correcting the error bits that existed in the sifted keys. In this article, we propose a polar …
General strong polarization
Arıkan's exciting discovery of polar codes has provided an altogether new way to efficiently
achieve Shannon capacity. Given a (constant-sized) invertible matrix M, a family of polar …
achieve Shannon capacity. Given a (constant-sized) invertible matrix M, a family of polar …
Distributed joint source-channel decoding using systematic polar codes
L **, P Yang, H Yang - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
This letter proposes a novel joint decoding scheme for correlated sources using systematic
polar codes. In the proposed scheme, each source independently encodes its message into …
polar codes. In the proposed scheme, each source independently encodes its message into …