1. Adams, C.M., Meijer, H.: Security-related comments regarding McEliec’s cryptosystem. IEEE Trans. Inf. Theory 35(2), 454–455 (1989)
2. Ahlswede, R., Csiszár, I.: Common randomness in information theory and cryptography—part I: secret sharing. IEEE Trans. Inf. Theory 39(4), 1121–1132 (1993)
3. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474–481 (1998)
4. Ar ikan, E.: Channel polarization: a method for constructing capacity-achieving codes for binary-input memoryless channels. IEEE Trans. Inf. Theory 55(7), 3051–3073 (2009)
5. Asokan, N., Ginzboorg, P.: Key agreement in ad-hoc networks. Comput. Commun. 23(17), 1627–1637 (2000)