| Publication | Date of Publication | Type |
|---|
Optimal rate-limited secret key generation from Gaussian sources using lattices IEEE Transactions on Information Theory | 2024-07-18 | Paper |
Private Remote Sources for Secure Multi-Function Computation IEEE Transactions on Information Theory | 2024-03-14 | Paper |
Keyless Covert Communication via Channel State Information IEEE Transactions on Information Theory | 2022-08-19 | Paper |
Universal Covertness for Discrete Memoryless Sources IEEE Transactions on Information Theory | 2021-09-07 | Paper |
State Leakage and Coordination With Causal State Knowledge at the Encoder IEEE Transactions on Information Theory | 2021-02-24 | Paper |
Steganography protocols for quantum channels Journal of Mathematical Physics | 2020-12-17 | Paper |
Covert and Secret Key Expansion Over Quantum Channels Under Collective Attacks IEEE Transactions on Information Theory | 2020-12-04 | Paper |
Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels IEEE Transactions on Information Theory | 2020-12-04 | Paper |
Covert Capacity of Non-Coherent Rayleigh-Fading Channels IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Learning an Adversary’s Actions for Secret Communication IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Strong Coordination of Signals and Actions Over Noisy Channels With Two-Sided State Information IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Covert Communication Over a $K$ -User Multiple-Access Channel IEEE Transactions on Information Theory | 2020-01-28 | Paper |
First- and Second-Order Asymptotics in Covert Communication IEEE Transactions on Information Theory | 2019-07-19 | Paper |
Empirical and Strong Coordination via Soft Covering With Polar Codes IEEE Transactions on Information Theory | 2018-09-19 | Paper |
Coordination in Distributed Networks via Coded Actions With Application to Power Control IEEE Transactions on Information Theory | 2018-09-14 | Paper |
Strong Coordination Over Multi-Hop Line Networks Using Channel Resolvability Codebooks IEEE Transactions on Information Theory | 2018-06-27 | Paper |
Coding Schemes for Achieving Strong Secrecy at Negligible Cost IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Strong Secrecy From Channel Resolvability IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Polar Coding for Secret-Key Generation IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Covert Communication Over Noisy Channels: A Resolvability Perspective IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Polar Coding for the Broadcast Channel With Confidential Messages: A Random Binning Analogy IEEE Transactions on Information Theory | 2017-04-28 | Paper |
| Physical-layer security. From information theory to security engineering | 2012-02-01 | Paper |
Security of Y-00 under heterodyne measurement and fast correlation attack Physics Letters. A | 2009-05-18 | Paper |
Wireless Information-Theoretic Security IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Strong Secrecy for Wireless Channels (Invited Talk) Lecture Notes in Computer Science | 2009-01-09 | Paper |