Author of the publication

A Graph-Based Modular Coding Scheme Which Achieves Semantic Security.

, and . ISIT, page 822-826. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs., and . IEEE Trans. Inf. Theory, 67 (1): 52-80 (2021)Optimal power allocation policies for the reliable transmission of a single packet via ARQ protocols., , and . ACSCC, page 475-479. IEEE, (2008)Common Randomness Generation over Slow Fading Channels., , , and . ISIT, page 1925-1930. IEEE, (2021)ε-Almost Collision-Flat Universal Hash Functions Motivated by Information-Theoretic Security., and . ISIT, page 2589-2594. IEEE, (2023)Mosaics of combinatorial designs for privacy amplification., and . ISIT, page 1630-1635. IEEE, (2021)Statistical verification of upper and lower bounds for the security performance of wiretap channels., , , and . WCNC, page 1-6. IEEE, (2023)A Proof of a Single-Letter Capacity Formula for MIMO Gauss-Markov Rayleigh Fading Channels., , , and . IEEE Trans. Inf. Theory, 69 (11): 6878-6896 (November 2023)Message Transmission and Common Randomness Generation over MIMO Slow Fading Channels with Arbitrary Channel State Distribution., , , and . CoRR, (2022)ε-Almost collision-flat universal hash functions and mosaics of designs., and . CoRR, (2023)Information-Theoretically Secret Reed-Muller Identification with Affine Designs., , , , and . CoRR, (2023)