Polar coding for secret-key generation

RA Chou, MR Bloch, E Abbe - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Practical implementations of secret-key generation are often based on sequential strategies,
which handle reliability and secrecy in two successive steps, called reconciliation and …

Challenges and some new directions in channel coding

E Ankan, N Ul Hassan, M Lentmaier… - Journal of …, 2015 - ieeexplore.ieee.org
Challenges and some new directions in channel coding Page 1 328 JOURNAL OF
COMMUNICATIONS AND NETWORKS, VOL. 17, NO. 4, AUGUST 2015 Challenges and …

A robust SRAM-PUF key generation scheme based on polar codes

B Chen, T Ignatenko, FMJ Willems… - … 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are relatively new security primitives used for device
authentication and device-specific secret key generation. In this paper we focus on SRAM …

Secret key generation over biased physical unclonable functions with polar codes

B Chen, FMJ Willems - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources,
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …

Sparse regression codes

R Venkataramanan, S Tatikonda… - … and Trends® in …, 2019 - nowpublishers.com
Develo** computationally-efficient codes that approach the Shannon-theoretic limits for
communication and compression has long been one of the major goals of information and …

Universal hashing for information-theoretic security

H Tyagi, A Vardy - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The information-theoretic approach to security entails harnessing the correlated
randomness available in nature to establish security. It uses tools from information theory …

Polar coding for bidirectional broadcast channels with common and confidential messages

M Andersson, RF Schaefer… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
The integration of multiple services such as the transmission of private, common, and
confidential messages at the physical layer is becoming important for future wireless …

Polar-code-based information reconciliation scheme with the frozen-bit erasure strategy for quantum key distribution

BY Tang, CQ Wu, W Peng, B Liu, WR Yu - Physical Review A, 2023 - APS
Information reconciliation (IR) ensures the correctness of quantum key distribution systems
by correcting the error bits that existed in the sifted keys. In this article, we propose a polar …

General strong polarization

J Błasiok, V Guruswami, P Nakkiran, A Rudra… - ACM Journal of the …, 2022 - dl.acm.org
Arıkan's exciting discovery of polar codes has provided an altogether new way to efficiently
achieve Shannon capacity. Given a (constant-sized) invertible matrix M, a family of polar …

Distributed joint source-channel decoding using systematic polar codes

L **, P Yang, H Yang - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
This letter proposes a novel joint decoding scheme for correlated sources using systematic
polar codes. In the proposed scheme, each source independently encodes its message into …