The secrecy gain is a lattice invariant that appears in the context of wiretap lattice coding. It has been studied for unimodular lattices, for 2 −, 3 −, and 5 −modular lattices. This paper studies the secrecy gain for extremal even l-modular lattices, for l ∈ {2, 3, 5, 6, 7, 11, 14, 15, 23}. We compute the highest secrecy gains as a function of the lattice dimension and the lattice level l. We show in particular that l = 2, 3, 6, 7, 11 are best for the respective ranges of dimensions {80, 76, 72}, {68, 64, 60, 56, 52, 48}, {44, 40, 36}, {34, 32, 30, 28, 26, 24, 22}, {18, 16, 14, 12, 10, 8}. This suggests that within a range of dimensions where different levels exist, the highest value of l tends to give the best secrecy gain. A lower bound...
This thesis is dedicated to the design of wiretap codes for fading channels, that is, codes that pro...
A natural and recurring idea in the knapsack/lattice cryptography literature is to start from a latt...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
The secrecy gain of a lattice is a lattice invariant used to characterize wiretap lattice codes for ...
This thesis is dedicated to the Gaussian wiretap channel coding problem. In particular, lattice Gaus...
This thesis is dedicated to the Gaussian wiretap channel coding problem. In particular, lattice Gaus...
Lattice coding over a Gaussian wiretap channel is considered with respect to a lattice invariant cal...
Lattice coding over a Gaussian wiretap channel, where an eavesdropper listens to transmissions betwe...
We present an overview of recent advances in the Area of information security using algebraic number...
We consider lattice coding over a Gaussian wiretap channel with respect to the secrecy gain, ...
International audience<p>We consider the Gaussian wiretap channel, where two legitimate players Alic...
This thesis is devoted to the analysis and construction of well-rounded lattices. The main motivati...
International audienceWe propose a new scheme of wiretap lattice coding that achieves semantic secur...
Recently, various criteria for constructing wiretap lattice coset codes have been proposed, most pro...
In this thesis we study the Belfiore-Sol??e conjecture on the secrecy function of unimodular lattice...
This thesis is dedicated to the design of wiretap codes for fading channels, that is, codes that pro...
A natural and recurring idea in the knapsack/lattice cryptography literature is to start from a latt...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
The secrecy gain of a lattice is a lattice invariant used to characterize wiretap lattice codes for ...
This thesis is dedicated to the Gaussian wiretap channel coding problem. In particular, lattice Gaus...
This thesis is dedicated to the Gaussian wiretap channel coding problem. In particular, lattice Gaus...
Lattice coding over a Gaussian wiretap channel is considered with respect to a lattice invariant cal...
Lattice coding over a Gaussian wiretap channel, where an eavesdropper listens to transmissions betwe...
We present an overview of recent advances in the Area of information security using algebraic number...
We consider lattice coding over a Gaussian wiretap channel with respect to the secrecy gain, ...
International audience<p>We consider the Gaussian wiretap channel, where two legitimate players Alic...
This thesis is devoted to the analysis and construction of well-rounded lattices. The main motivati...
International audienceWe propose a new scheme of wiretap lattice coding that achieves semantic secur...
Recently, various criteria for constructing wiretap lattice coset codes have been proposed, most pro...
In this thesis we study the Belfiore-Sol??e conjecture on the secrecy function of unimodular lattice...
This thesis is dedicated to the design of wiretap codes for fading channels, that is, codes that pro...
A natural and recurring idea in the knapsack/lattice cryptography literature is to start from a latt...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...