Matthieu Bloch
Matthieu Bloch
Professor of Electrical and Computer Engineering, Georgia Tech
Verified email at - Homepage
Cited by
Cited by
Wireless information-theoretic security
M Bloch, J Barros, MRD Rodrigues, SW McLaughlin
Information Theory, IEEE Transactions on 54 (6), 2515-2534, 2008
Physical-Layer Security: From Information Theory to Security Engineering
M Bloch, J Barros
Cambridge Univ Pr, 2011
Quantum key distribution over with an all-fiber continuous-variable system
J Lodewyck, M Bloch, R García-Patrón, S Fossier, E Karpov, E Diamanti, ...
Physical Review A—Atomic, Molecular, and Optical Physics 76 (4), 042305, 2007
Covert communication over noisy channels: A resolvability perspective
MR Bloch
IEEE Transactions on Information Theory 62 (5), 2334-2354, 2016
Cooperative security at the physical layer: A summary of recent advances
R Bassily, E Ekrem, X He, E Tekin, J Xie, MR Bloch, S Ulukus, A Yener
IEEE Signal Processing Magazine 30 (5), 16-28, 2013
Strong secrecy from channel resolvability
MR Bloch, JN Laneman
IEEE Transactions on Information Theory 59 (12), 8077-8098, 2013
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
WK Harrison, J Almeida, MR Bloch, SW McLaughlin, J Barros
IEEE Signal Processing Magazine 30 (5), 41-50, 2013
Wireless secrecy regions with friendly jamming
JP Vilela, M Bloch, J Barros, SW McLaughlin
IEEE Transactions on Information Forensics and Security 6 (2), 256-266, 2011
Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser
N Li, B Kim, VN Chizhevsky, A Locquet, M Bloch, DS Citrin, W Pan
Optics express 22 (6), 6634-6646, 2014
Polar coding for secret-key generation
RA Chou, MR Bloch, E Abbe
IEEE Transactions on Information Theory 61 (11), 6213-6237, 2015
Frequency-coded quantum key distribution
M Bloch, SW McLaughlin, JM Merolla, F Patois
Optics letters 32 (3), 301-303, 2007
Error-control coding for physical-layer secrecy
M Bloch, M Hayashi, A Thangaraj
Proceedings of the IEEE 103 (10), 1725-1746, 2015
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
A Subramanian, A Thangaraj, M Bloch, SW McLaughlin
IEEE Transactions on Information Forensics and Security 6 (3), 585-594, 2011
LDPC-based Gaussian key reconciliation
M Bloch, A Thangaraj, SW McLaughlin, JM Merolla
Information Theory Workshop, 2006. ITW'06 Punta del Este. IEEE, 116-120, 2006
First-and second-order asymptotics in covert communication
M Tahmasbi, MR Bloch
IEEE Transactions on Information Theory 65 (4), 2190-2212, 2018
An overview of information-theoretic security and privacy: Metrics, limits and applications
M Bloch, O Günlü, A Yener, F Oggier, HV Poor, L Sankar, RF Schaefer
IEEE Journal on Selected Areas in Information Theory 2 (1), 5-22, 2021
Polar coding for the broadcast channel with confidential messages: A random binning analogy
RA Chou, MR Bloch
IEEE Transactions on Information Theory 62 (5), 2410-2429, 2016
On the secrecy capacity of arbitrary wiretap channels
M Bloch, JN Laneman
2008 46th Annual Allerton Conference on Communication, Control, and …, 2008
Strongly secure communications over the two-way wiretap channel
AJ Pierrot, MR Bloch
IEEE Transactions on Information Forensics and Security 6 (3), 595-605, 2011
Keyless covert communication over multiple-access channels
KSK Arumugam, MR Bloch
2016 IEEE International Symposium on Information Theory (ISIT), 2229-2233, 2016
The system can't perform the operation now. Try again later.
Articles 1–20