Publications

Export 95 results:
Author [ Type(Asc)] Year
Journal Article
Vilela, J. Paulo, M. R. Bloch, J. Barros, and S. W. McLaughlin, "Wireless Secrecy Regions with Friendly Jamming", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 2, pp. 256–266, June, 2011.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security", {IEEE} {T}rans. {I}nf. {T}heory, vol. 54, no. 6, pp. 2515–2534, June, 2008.
Li, N., B. Kim, V.. N. Chizhevsky, A.. Locquet, M. R. Bloch, D.. S. Citrin, and W. Pan, "Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser", {O}ptics {E}xpress, vol. 22, no. 6: OSA, pp. 6634–6646, March, 2014.
Bloch, M. R., and N. J. Laneman, "Strong Secrecy from Channel Resolvability", {IEEE} {T}ransactions on {I}nformation {T}heory, vol. 59, no. 12, pp. 8077-8098, December, 2013.
Chou, R. A., and M. R. Bloch, "Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation", IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4941–4957, August, 2014.
Pierrot, A. J., and M. R. Bloch, "Strongly Secure Communications Over the Two-Way Wiretap Channel", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 3, pp. 595–605, September, 2011.
Subramanian, A., A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 6, no. 3, pp. 585–594, September, 2011.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-blind Key-Agreement over MIMO Fading Channels", {IEEE} {T}ransactions on {C}ommunications, vol. 61, no. 2, pp. 620–627, February, 2013.
Donnet, S., A. Thangaraj, M. R. Bloch, J. Cussey, J-M. Merolla, and L. Larger, "Security of Y-00 under heterodyne measurement and fast correlation attack", {P}hysics {L}etters {A}, vol. 356, no. 6, pp. 406–410, August, 2006.
Wong, T. F., M. R. Bloch, and J. M. Shea, "Secret Sharing over Fast-Fading MIMO Wiretap Channels", {EURASIP} {J}ournal on {W}ireless {C}ommunications and {N}etworking, vol. 2009, pp. 506973/1-17, 2009.
Lodewyck, J., M. R. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, et al., "Quantum key distribution over 25 km with an all-fiber continuous-variable system", {P}hysical {R}eview {A}, vol. 76, pp. 042305/1-10, October, 2007.
Chou, R. A., and M. R. Bloch, "Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy", IEEE Transactions on Information Theory, vol. 62, issue 5, pp. 2410-2429, May, 2016.
Chou, R. A., M. R. Bloch, and E. Abbe, "Polar Coding for Secret-Key Generation", IEEE Transactions on Information Theory, vol. 61, issue 11, November, 2015.
Bloch, M. R., R. Narasimha, and S. W. McLaughlin, "Network Security for Client-Server Architecture using Wiretap Codes", {IEEE} {T}ransactions on {I}nformation {F}orensics and {S}ecurity, vol. 3, no. 3, pp. 404–413, September, 2008.
Tan, V. Y. F., and M. R. Bloch, "Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels", IEEE Transactions on Information Forensics and Security, vol. 10, issue 9, pp. 1891-1904, September, 2015.
Bloch, M. R., S. W. McLaughlin, F. Patois, and J-M. Merolla, "Frequency-Coded Quantum Key Distribution", {O}ptics {L}etters, vol. 32, no. 3, pp. 301–303, February, 2007.
Bloch, M. R., and N. J. Laneman, "Exploiting Partial Channel State Information for Secrecy over Wireless Channels", {IEEE} {J}ournal on {S}elected {A}reas in {C}ommunications, vol. 31, no. 9, pp. 1840-1849, September, 2013.
Bloch, M. R., M. Hayashi, and A. Thangaraj, "Error-Control Coding for Physical-Layer Secrecy", Proceedings of IEEE, vol. 103, issue 10, pp. 1725-1746, October, 2015.
Bloch, M. R., "Covert Communication over Noisy Channels: A Resolvability Perspective", IEEE Transactions on Information Theory, vol. 62, issue 5, pp. 2334-2354, May, 2016.
Bassily, R., E. Ekrem, X. He, E. Tekin, J. Xie, M. R. Bloch, S. Ulukus, and A. Yener, "Cooperative Security at the Physical Layer: A Summary of Recent Advances", {IEEE} {S}ignal {P}rocessing {M}agazine, vol. 30, no. 5, pp. 16–28, September, 2013.
Chou, R.. A., B.. N. Vellambi, M.. R. Bloch, and J.. Kliewer, "Coding Schemes for Achieving Strong Secrecy at Negligible Cost", IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1858-1873, October, 2017.
Harrison, W. K., J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security", {IEEE} {S}ignal {P}rocessing {M}agazine, vol. 30, no. 5, pp. 41–50, September, 2013.
Conference Proceedings
Vellambi, B. N., J. Kliewer, and M. R. Bloch, "Strong Coordination over Multi-hop Line Networks", IEEE Information Theory Workshop, Jeju, South Korea, IEEE, pp. 192--196, October, 2015.
Chou, R. A., and M. R. Bloch, "Polar Coding for the Broadcast Channel with Confidential Messages", Proc. IEEE Information Theory Workshop, Jerusalem, Israel, IEEE, pp. 1-5, May, 2015.
Chou, R. A., M. R. Bloch, and J. Kliewer, "Polar Coding for Empirical and Strong Coordination via Distribution Approximation", Proc. IEEE International Symposium on Information Theory, pp. 1512 - 1516, June, 2015.
Vellambi, B. N., M. R. Bloch, R. A. Chou, and J. Kliewer, "Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?", Proc. IEEE International Symposium on Information Theory, Honk Kong, IEEE, pp. 2171-2175, June, 2015.
Bloch, M. R., "A Channel Resolvability Perpsective on Stealth Communications", IEEE International Symposium on Information Theory, Hong Kong, pp. 2535 - 2539, June, 2015.
Conference Paper
Arumugam, K. Suria Kuma, and M. R. Bloch, "Uniform Distributed Source Coding for the Multiple Access Wiretap Channel", Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, pp. 127–132, October, 2014.
Li, N., B. Kim, V.. N. Chizhevsky, A. Locquet, M. R. Bloch, D. Citrin, and W. Pan, "Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser", Proc.of CLEO, San Jose, CA, pp. 1–2, June, 2014.
Bloch, M. R., and J. Kliewer, "Strong Coordination over a Three-Terminal Relay Network", Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, pp. 646–650, November, 2014.
Vellambi, B.. N., J.. Kliewer, and M. R. Bloch, "Strong coordination over a line when actions are Markovian", Proc. of Annual Conference on Information Science and Systems, pp. 412-417, March, 2016.
Bloch, M. R., and J. Kliewer, "Strong coordination over a line network", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2319-2323, July, 2013.
Bloch, M. R., and J. Kliewer, "On secure communication with constrained randomization", Proc. IEEE International Symp.Information Theory, Cambridge, MA, pp. 1172–1176, July, 2012.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel", Proc. of Global Conference on Signal and Information Processing, Austin, TX, pp. 277–280, September, 2013.
Ling, C., L. Luzzi, and M. R. Bloch, "Secret key generation from Gaussian sources using lattice hashing", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2621-2625, July, 2013.
Tahmasbi, M., and M. R. Bloch, "Second-Order Asymptotics of Covert Communications over Noisy Channels", Proc. of IEEE International Symposium on Information Theory, pp. 2224-2228, July, 2016.
Barros, J., and M. R. Bloch, "Strong Secrecy for Wireless Channels", Information Theoretic Security, Calgary, Canada, Springer Berlin / Heidelberg, pp. 40-53, August, 2008.
Suresh, A. T., A. Subramanian, A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong Secrecy for Erasure Wiretap Channels", Proc. IEEE Information Theory Workshop, Dublin, Ireland, September, 2010.
Bloch, M. R., L. Luzzi, and J. Kliewer, "Strong Coordination with Polar Codes", Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 565-571, October, 2012.
Subramanian, A., A. T. Suresh, A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Strong and Weak Secrecy in Wiretap Channels", Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, pp. 30 - 34, September, 2010.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-Blind Key-Agreement over MIMO Quasi-Static Channels", Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, pp. 1–6, March, 2011.
Renna, F., M. R. Bloch, and N. Laurenti, "Semi-Blind Key-Agreement over MIMO Fading Channels", Proc. IEEE International Conference on Communications, Kyoto, Japan, pp. 1–6, June, 2011.
Dunn, B. P., M. R. Bloch, and N. J. Laneman, "Secure bits through queues", Proc. IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, pp. 37–41, June, 2009.
MolavianJazi, E., M. R. Bloch, and N. J. Laneman, "Arbitrary Jamming Can Preclude Secure Communications", Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 1069–1075, September, 2009.
Fossier, S., J.. Lodewyck, E.. Diamanti, M. R. Bloch, T.. Debuisschert, R.. Tualle-Brouri, and P.. Grangier, "Quantum Key Distribution over 25 km Using a Fiber Setup Based on Continuous Variables", Proc. of CLEO/QELS, San Jose, CA, pp. 1–2, May, 2008.
Lodewyck, J.., M. R. Bloch, R.. Garcia-Patron, S.. Fossier, E.. Karpov, E.. Diamanti, T.. Debuisschert, N.. J. Cerf, R.. Tualle-Brouri, S. W. McLaughlin, et al., "Quantum key distribution device with coherent states", Proc. of SPIE Optics East, vol. 6780, Boston, MA, USA, pp. 67800Z/1-14, September, 2007.
Arumugam, K. Suria Kuma, M. R. Bloch, and E. Abbe, "Polar Coding for Secret-Key Generation", Proc. of Information Theory Workshop, Sevilla, Spain, pp. 1-5, April, 2013.
Cervia, G.., L.. Luzzi, M. R. Bloch, and M.. Le Treust, "Polar coding for empirical coordination of signals and actions over noisy channels", Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, pp. 81-85, September, 2016.
Bloch, M. R., J. Barros, and S. W. McLaughlin, "Practical Information-Theoretic Commitment", Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, pp. 1035–1039, September, 2007.
Chou, R. A., and M. R. Bloch, "One-way rate-limited sequential key-distillation", Proc. IEEE International Symp.Information Theory, Cambridge, MA, pp. 1777–1781, July, 2012.
Bloch, M. R., and N. J. Laneman, "On the Secrecy Capacity of Arbitrary Wiretap Channels", Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 818–825, September, 2008.
Rodrigues, M. R. D., A. Somekh-Baruch, and M. R. Bloch, "On Gaussian Wiretap Channels with Arbitrary Inputs", Proc. of European Wireless, Lucca, Italy, pp. 774–781, April, 2010.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "An Opportunistic Physical-Layer Approach to Secure Wireless Communications", Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, pp. 849–854, September, 2006.
Renna, F., N. Laurenti, S. Tomasin, M. Baldi, N. Maturo, M. Bianchi, F. Chiaraluce, and M. R. Bloch, "Low-power secret key agreement over OFDM", Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budaptest, Hungary, pp. 43–48, April, 2013.
Arumugam, K. Suria Kuma, M. R. Bloch, and J. Kliewer, "Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel", Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, pp. 466–470, November, 2014.
Vellambi, B. N., J. Kliewer, and M. R. Bloch, "Lossy Compression with Near-uniform Encoder Outputs", Proc. of IEEE International Symposium on Information Theory, pp. 530-534, July, 2016.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "LDPC-based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper's Channels", Proc. IEEE Information Theory Workshop, Chengdu, China, pp. 155-159, October, 2006.
Bloch, M. R., A. Thangaraj, S. W. McLaughlin, and J-M. Merolla, "LDPC-based Secret Key Agreement over the Gaussian wiretap channel", Proc. IEEE International Symposium on Information Theory, Seattle, USA, pp. 1179-1183, July, 2006.
Bloch, M. R., A. Thangaraj, S. W. McLaughlin, and J-M. Merolla, "LDPC-based Gaussian Key Reconciliation", Proc. IEEE Information Theory Workshop, Punta del Este, Uruguay, pp. 116-120, March, 2006.
Pierrot, A. J., and M. R. Bloch, "LDPC-based coded cooperative jamming codes", Proc. of IEEE Information Theory Workshop, Lausanne, Switzerland, pp. 462–466, September, 2012.
Bloch, M. R., J.-M.. Merolla, S. W. McLaughlin, and J.-P.. Goedgebuer, "Long distance continuous variable transmission system using sideband detection method", First Russian-French Laser Physics Workshop for Young Scientists (RFLPW-YS), St. Petersburg, Russia, July, 2004.
Arumugam, K. Suria Kuma, and M. R. Bloch, "Keyless Covert Communication over Multiple-Access Channels", Proc. of IEEE International Symposium on Information Theory, pp. 2229-2233, July, 2016.
Arumugam, K.. S. K., and M. R. Bloch, "Keyless asynchronous covert communication", Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, pp. 191-195, September, 2016.
Pierrot, A. J., and M. R. Bloch, "Joint Channel Intrinsic Randomness and Channel Resolvability", Proc. of Information Theory Workshop, Sevilla, Spain, pp. 1-5, April, 2013.
Tan, V. Y. F., and M. R. Bloch, "Information spectrum approach to strong converse theorems for degraded wiretap channels", Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 747-754, September, 2014.
Cussey, J., M. R. Bloch, A. Thangaraj, J-M. Merolla, and S. W. McLaughlin, "Integrated Direct-Modulation Based Quantum Cryptography System", Proc. Optical Network and Technologies, Pisa, Italy, IFIP, pp. 390–395, October, 2004.
Bloch, M. R., and N. J. Laneman, "Information-Spectrum Methods for Information-Theoretic Security", Proc. Information Theory and Applications Workshop, San Diego, CA, pp. 23–28, February, 2009.
Bloch, M. R., J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Information Theoretic Security for Wireless Channels - Theory and Practice", Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, February, 2007.
Diamanti, E., S. Fossier, J. Lodewyck, M. R. Bloch, R. Garcia-Patron, E. Karpov, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, et al., "Implementation of an all-fiber continuous variables quantum key distribution system", International Conference on Quantum Information Processing and Communication, Barcelona, Spain, October, 2007.
Vilela, J. Paulo, M. R. Bloch, J. Barros, and S. W. McLaughlin, "Friendly Jamming for Wireless Secrecy", Proc. of IEEE International Conference on Communications, Cape Town, South Africa, pp. 1550-3607, May, 2010.
Pierrot, A. J., K. Suria Kuma Arumugam, and M. R. Bloch, "Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments", Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, April, 2013.
Le Treust, M., and M. R. Bloch, "Empirical Coordination, State Masking and State Amplification: Core of the Decoder's Knowledge", Proc. of IEEE International Symposium on Information Theory, pp. 895-899, July, 2016.
Chou, R. A., and M. R. Bloch, "Data compression with nearly uniform ouput", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 1979-1983, July, 2013.
Lodewyck, J., M. R. Bloch, S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, "Distribution quantique de clé a 25 km au moyen d'un dispositif fibré utilisant des variables continues", 10eme Colloque sur les Lasers et l'Optique Quantique, Grenoble, France, July, 2007.
Cussey, J., M. R. Bloch, A. Thangaraj, J-M. Merolla, and S. W. McLaughlin, "Direct-Modulation Scheme for Free-Space Quantum Cryptography", Proc. European Conference on Optical Communication, Stockholm, Sweden, September, 2004.
Bloch, M. R., "Achieving Secrecy: capacity vs. Resolvability", Proc. of IEEE International Symposium on Information Theory, Saint Petersburg, Russia, pp. 632–636, August, 2011.
Li, N., B. Kim, V.. N. Chizhevsky, A.. Locquet, M. R. Bloch, D.. S. Citrin, and W. Pan, "Chaotic semiconductor lasers for ultrafast random bit generation", Proc. of Dynamics Days US, Atlanta, GA, pp. 23, January, 2014.
Donnet, S., A. Thangaraj, M. R. Bloch, J. Cussey, J-M. Merolla, and L. Larger, "Cryptanalysis of Y-00 under Heterodyne Measurement and Fast Correlation Attack", Proc. European Conference on Optical Communication, Cannes, France, pp. 1–2, September, 2006.
Kaimalettu, S., A. Thangaraj, M. R. Bloch, and S. W. McLaughlin, "Constellation Shaping using LDPC Codes", Proc. IEEE International Symposium on Information Theory, Nice, France, pp. 2366–2370, June, 2007.
Bloch, M. R., and A. Thangaraj, "Confidential Messages to a Cooperative Relay", Proc. of the IEEE Information Theory Workshop, Porto, Portugal, pp. 154–158, May, 2008.
Bloch, M. R., R. Narasimha, and S. W. McLaughlin, "Client-Server Architecture Design based on Wiretap Codes", Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, pp. 44–47, March, 2008.
Bloch, M. R., "Channel Scrambling for Secrecy", Proc. of IEEE International Symposium on Information Theory, Seoul, Korea, pp. 2452–2456, July, 2009.
Bloch, M. R., "Channel Intrinsic Randomness", Proc. of IEEE International Symposium on Information Theory, Austin, TX, pp. 2607–2611, June, 2010.
Luzzi, L., and M. R. Bloch, "Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels", Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, pp. 641–647, May, 2011.
Boutros, J. J., V. Dedeoglu, and M. R. Bloch, "The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel", Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, February, 2014.
Book Chapter
Bloch, M. R., "Physical Layer Security in Wireless Communications", Wireless Networks and Mobile Communications: CRC Press, pp. 1–26, 2013.