Author of the publication

A Graph-Based Modular Coding Scheme Which Achieves Semantic Security.

, and . ISIT, page 822-826. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs., and . IEEE Trans. Inf. Theory, 67 (1): 52-80 (2021)ε-Almost Collision-Flat Universal Hash Functions Motivated by Information-Theoretic Security., and . ISIT, page 2589-2594. IEEE, (2023)Mosaics of combinatorial designs for privacy amplification., and . ISIT, page 1630-1635. IEEE, (2021)Common Randomness Generation over Slow Fading Channels., , , and . ISIT, page 1925-1930. IEEE, (2021)Optimal power allocation policies for the reliable transmission of a single packet via ARQ protocols., , and . ACSCC, page 475-479. IEEE, (2008)Statistical verification of upper and lower bounds for the security performance of wiretap channels., , , and . WCNC, page 1-6. IEEE, (2023)Secure Estimation and Zero-Error Secrecy Capacity., , , , , and . IEEE Trans. Automat. Contr., 64 (3): 1047-1062 (2019)A Graph-Based Modular Coding Scheme Which Achieves Semantic Security., and . ISIT, page 822-826. IEEE, (2019)Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy., , , and . WIFS, page 1-6. IEEE, (2019)Mosaics of combinatorial designs for information-theoretic security., and . Des. Codes Cryptogr., 90 (3): 593-632 (2022)