We extend previous results on covert communication over the additive whi...
We propose a lattice-based scheme for secret key generation from Gaussia...
We consider FrodoKEM, a lattice-based cryptosystem based on LWE, and pro...
In this paper, we consider a semi-deterministic wiretap channel where th...
In this paper we consider the diversity-multiplexing gain tradeoff (DMT)...
We consider a key encapsulation mechanism (KEM) based on ring-LWE where
...
We consider a network of two nodes separated by a noisy channel, in whic...
In this paper, we propose a coding scheme based on polar codes for empir...
We consider a network of two nodes separated by a noisy channel with two...
In this paper we consider space-time codes where the code-words are
rest...
In the decades following Shannon's work, the quest to design codes for t...