Abstract—This paper considers the problem of end-end se-curity enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy en-coding is invoked to deliver additional secure information. More specifically, we study secrecy enhancement of DES block cipher working in cipher feedback model (CFB) when adjustable and intentional noise is introduced into encrypted data in application layer. A verification strategy in exhaustive search step of linear attack is designed to allow Eve to mount a successful attack in the noisy environment. Thus, a controllable wiretap channel is created over multiple frames by taking advantage of errors ...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
Abstract In this paper, we provide secrecy metrics applicable to physical-layer coding techniques wi...
Abstract—An authentication counterpart of Wyner’s study of the wiretap channel is developed in this ...
This paper considers the problem of end-to-end security enhancement by resorting to deliberate noise...
In this paper we propose an encoding-encryption approach to take advantage of intentional noise intr...
In this paper, we propose a feedback scheme to achieve a strictly positive secrecy rate over an eave...
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap c...
The secrecy capacity of an extended communication model of wiretap channelII is determined. In this ...
Submitted to IEEE Trans. Information TheoryInternational audienceIt is a well-known fact that feedba...
Abstract—Current security techniques can be implemented with either secret key exchange or physical-...
[[abstract]]The impact of quantized channel direction information (CDI) on the achievable secrecy ra...
In this paper, we propose a feedback scheme for transmitting secret messages between two legitimate ...
[[abstract]]Physical-layer secrecy in wireless fading channels has been studied extensively in recen...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—We consider secure communications over MIMO wiretap channels, in the presence of a passive ...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
Abstract In this paper, we provide secrecy metrics applicable to physical-layer coding techniques wi...
Abstract—An authentication counterpart of Wyner’s study of the wiretap channel is developed in this ...
This paper considers the problem of end-to-end security enhancement by resorting to deliberate noise...
In this paper we propose an encoding-encryption approach to take advantage of intentional noise intr...
In this paper, we propose a feedback scheme to achieve a strictly positive secrecy rate over an eave...
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap c...
The secrecy capacity of an extended communication model of wiretap channelII is determined. In this ...
Submitted to IEEE Trans. Information TheoryInternational audienceIt is a well-known fact that feedba...
Abstract—Current security techniques can be implemented with either secret key exchange or physical-...
[[abstract]]The impact of quantized channel direction information (CDI) on the achievable secrecy ra...
In this paper, we propose a feedback scheme for transmitting secret messages between two legitimate ...
[[abstract]]Physical-layer secrecy in wireless fading channels has been studied extensively in recen...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—We consider secure communications over MIMO wiretap channels, in the presence of a passive ...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
Abstract In this paper, we provide secrecy metrics applicable to physical-layer coding techniques wi...
Abstract—An authentication counterpart of Wyner’s study of the wiretap channel is developed in this ...