References
- C. E. Shannon, 'Communication theory of secrecy systems,' Bell Syst. Tech. J., vol. 29, pp. 656–715, 1949
- A. D.Wyner, 'The wire-tap channel,' Bell Syst. Tech. J., vol. 54, pp. 1355–1387, Oct. 1975 https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- I. Csiszar and J. Korner, 'Broadcast channels with confidential messages,' IEEE Trans. Inf. Theory, vol. 24, pp. 339–348, May 1978 https://doi.org/10.1109/TIT.1978.1055892
- A. O. Hero, 'Secure space-time communication,' IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235–3249, Dec. 2003 https://doi.org/10.1109/TIT.2003.820010
- X. Li and J. Hwu, 'Using antenna array redundancy and channel diversity for secure wireless transmissions,' J. Commun., vol. 2, no. 3, pp. 24–32, May 2007 https://doi.org/10.4304/jcm.2.3.24-32
- H. Kim and J. D. Villasenor, 'Secure MIMO communcications in a system with equal numbers of transmit and receive antennas,' IEEE Commun. Lett., vol. 12, no. 5, pp. 386–388, May 2008 https://doi.org/10.1109/LCOMM.2008.080077
- M. Yuksel and E. Erkip, 'The relay channel with a wire-tapper,' in Proc. 41st Annual. CISS, Mar. 2007
- E. Tekin and A. Yener, 'The general Gaussian multiple-access and twoway wire-tap channels: Achievable rates and cooperative jamming,' IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, June 2008 https://doi.org/10.1109/TIT.2008.921680
- L. Lai, H. El Gamal and H. V. Poor, The Wiretap Channel with Feedback: Encryption over the Channel, [Online]. Available: http://www.ece.osu. edu/helgamal/publications.html
- A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J. M. Merolla, 'Applications of LDPC codes to the wiretap channel,' IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933–2945, Aug. 2007 https://doi.org/10.1109/TIT.2007.901143
- M. Nloch, J. Barros and M. R. D. Rodrigues, 'Wireless information theoretic security,' IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, June 2008 https://doi.org/10.1109/TIT.2008.921908
- L. Bazzi, T. J. Richardson, and R. L. Urbanke, "Exact thresholds and optimal codes for the binary-symmetric channel and gallager's decoding algorithm A," IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2010–2021, Sept. 2004 https://doi.org/10.1109/TIT.2004.833352
- U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733–742, Mar. 1993 https://doi.org/10.1109/18.256484
- C. Berrou, A. Glavieux, and P. Thitimajshima, 'Near Shannon limit error correcting coding and decoding: Turbo codes,' in Proc. IEEE ICC, (Geneva, Switzerland), 1993, pp. 1064–1070 https://doi.org/10.1109/ICC.1993.397441
- R. G. Gallager, Low Density Parity Check Codes. Cambridge, MA: MIT Press, 1963
- D. J. C. MacKay, 'Good error-correcting codes based on very sparse matrices,' IEEE Trans. Inf. Theory, vol. 45, pp. 399–431, Mar. 1999 https://doi.org/10.1109/18.748992
- S.Wolf, 'Theoretically and computationally secure key agreement in cryptography', Ph.D. Dissertation, 1999
- I. Csiszar and P. Narayan, 'Common randomness in information theory and cryptography, part I: Secret sharing,' IEEE Trans. Inf. Theory, vol. 39, pp. 1121–1132, July 1993 https://doi.org/10.1109/18.243431
- J. Muramatsu, 'Secret key agreement from correlated source outputs using low density parity check matrices,' IEICE Trans. Fund. Elec. Comm. Comp., vol. E89-A, no. 7, pp. 2036–2046, July 2006 https://doi.org/10.1093/ietfec/e89-a.7.2036
- B. Marco, C. iovanni, and C. Franco, 'Variable rate LDPC codes for wireless applications,' in Proc. Soft COM, 2006, pp. 301–305 https://doi.org/10.1109/SOFTCOM.2006.329768