Matthieu Bloch
Matthieu Bloch
Associate Professor of Electrical and Computer Engineering, Georgia Tech
Verified email at ece.gatech.edu - Homepage
Title
Cited by
Cited by
Year
Wireless information-theoretic security
M Bloch, J Barros, MRD Rodrigues, SW McLaughlin
Information Theory, IEEE Transactions on 54 (6), 2515-2534, 2008
16302008
Physical-Layer Security: From Information Theory to Security Engineering
M Bloch, J Barros
Cambridge Univ Pr, 2011
10042011
Quantum key distribution over 25 km with an all-fiber continuous-variable system
J Lodewyck, M Bloch, R García-Patrón, S Fossier, E Karpov, E Diamanti, ...
Physical Review A 76 (4), 042305, 2007
4222007
Cooperative security at the physical layer: A summary of recent advances
R Bassily, E Ekrem, X He, E Tekin, J Xie, MR Bloch, S Ulukus, A Yener
IEEE Signal Processing Magazine 30 (5), 16-28, 2013
1972013
Covert communication over noisy channels: A resolvability perspective
MR Bloch
IEEE Transactions on Information Theory 62 (5), 2334-2354, 2016
1962016
Strong secrecy from channel resolvability
MR Bloch, JN Laneman
IEEE Transactions on Information Theory 59 (12), 8077-8098, 2013
1812013
Wireless secrecy regions with friendly jamming
JP Vilela, M Bloch, J Barros, SW McLaughlin
IEEE Transactions on Information Forensics and Security 6 (2), 256-266, 2011
1612011
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
WK Harrison, J Almeida, MR Bloch, SW McLaughlin, J Barros
IEEE Signal Processing Magazine 30 (5), 41-50, 2013
1572013
Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser
N Li, B Kim, VN Chizhevsky, A Locquet, M Bloch, DS Citrin, W Pan
Optics express 22 (6), 6634-6646, 2014
962014
Frequency-coded quantum key distribution
M Bloch, SW McLaughlin, JM Merolla, F Patois
Optics letters 32 (3), 301-303, 2007
872007
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
A Subramanian, A Thangaraj, M Bloch, SW McLaughlin
IEEE Transactions on Information Forensics and Security 6 (3), 585-594, 2011
862011
Polar coding for secret-key generation
RA Chou, MR Bloch, E Abbe
2013 IEEE Information Theory Workshop (ITW), 1-5, 2013
832013
LDPC-based Gaussian key reconciliation
M Bloch, A Thangaraj, SW McLaughlin, JM Merolla
Information Theory Workshop, 2006. ITW'06 Punta del Este. IEEE, 116-120, 2006
78*2006
Strongly secure communications over the two-way wiretap channel
AJ Pierrot, MR Bloch
IEEE Transactions on Information Forensics and Security 6 (3), 595-605, 2011
762011
On the secrecy capacity of arbitrary wiretap channels
M Bloch, JN Laneman
2008 46th Annual Allerton Conference on Communication, Control, and …, 2008
742008
Polar coding for the broadcast channel with confidential messages: A random binning analogy
RA Chou, MR Bloch
IEEE Transactions on Information Theory 62 (5), 2410-2429, 2016
73*2016
Error-control coding for physical-layer secrecy
M Bloch, M Hayashi, A Thangaraj
Proceedings of the IEEE 103 (10), 1725-1746, 2015
732015
Arbitrary jamming can preclude secure communication
E MolavianJazi, M Bloch, JN Laneman
2009 47th Annual Allerton Conference on Communication, Control, and …, 2009
632009
LDPC-based secret key agreement over the Gaussian wiretap channel
M Bloch, A Thangaraj, SW McLaughlin, JM Merolla
2006 IEEE International Symposium on Information Theory, 1179-1183, 2006
582006
Friendly jamming for wireless secrecy
JP Vilela, M Bloch, J Barros, SW McLaughlin
2010 IEEE International Conference on Communications, 1-6, 2010
572010
The system can't perform the operation now. Try again later.
Articles 1–20