"Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels", Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, pp. 641–647, May, 2011.
"Strong Coordination with Polar Codes", Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, pp. 565-571, October, 2012.
"Secret key generation from Gaussian sources using lattice hashing", Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2621-2625, July, 2013.