Affiliation:
1. Department of Electronic Engineering, Kyonggi University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference7 articles.
1. [1] M. Baldi, M. Bianchi, and F. Chiaraluce, “Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis,” IEEE Trans. Inf. Forensics Security, vol.7, no.3, pp.883-894, June 2012. 10.1109/tifs.2012.2187515
2. [2] S. Park and H. Son, “Near-perfect code scrambling with limited key information for wiretap channels,” IEEE Trans. Veh. Technol., vol.69, no.11, pp.13410-13423, Nov. 2020. 10.1109/tvt.2020.3026087
3. [3] J.W. Wallace and R.K. Sharma, “Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis,” IEEE Trans. Inf. Forensics Security, vol.5, no.3, pp.381-392, Sept. 2010. 10.1109/tifs.2010.2052253
4. [4] S. Tomasin, F. Trentini, and N. Laurenti, “Secret key agreement by LLR thresholding and syndrome feedback over AWGN channel,” IEEE Commun. Lett., vol.18, no.1, pp.26-29, Jan. 2014. 10.1109/lcomm.2013.112513.131744
5. [5] K. Tochikubo, T. Uyematsu, and R. Matsumoto, “Secret key capacity for ergodic correlated sources,” IEICE. Trans. Fundamentals, vol.E87-A, no.6, pp.1651-1654, June 2004.