Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs., and . IEEE Trans. Inf. Theory, 67 (1): 52-80 (2021)ε-Almost Collision-Flat Universal Hash Functions Motivated by Information-Theoretic Security., and . ISIT, page 2589-2594. IEEE, (2023)Common Randomness Generation over Slow Fading Channels., , , and . ISIT, page 1925-1930. IEEE, (2021)Mosaics of combinatorial designs for privacy amplification., and . ISIT, page 1630-1635. IEEE, (2021)Optimal power allocation policies for the reliable transmission of a single packet via ARQ protocols., , and . ACSCC, page 475-479. IEEE, (2008)Statistical verification of upper and lower bounds for the security performance of wiretap channels., , , and . WCNC, page 1-6. IEEE, (2023)Arbitrarily Varying Wiretap Channels with Non-Causal Side Information at the Jammer., , , and . ISIT, page 938-943. IEEE, (2020)Information-Theoretically Secret Reed-Muller Identification with Affine Designs., , , , and . CoRR, (2023)Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment., , , , , , and . GLOBECOM, page 4044-4050. IEEE, (2022)A Rigorous Proof of the Capacity of MIMO Gauss-Markov Rayleigh Fading Channels., , , and . ISIT, page 2732-2737. IEEE, (2022)