"Secret key generation from Gaussian sources using lattice hashing",
Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2621-2625, July, 2013.
"Strong Coordination with Polar Codes",
Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 565-571, October, 2012.
"Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels",
Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, pp. 641–647, May, 2011.