[1] WYNER D.The wiretap channel[J].Bell System Technical Journal,1975,54(8):1355-1387.
[2] ARIKAN E.Channel polarization:A method for constructing capacity-achieving codes for symmetry binary-input memoryless channels[C]//2008 IEEE International Symposium on Information Theory.Piscataway,NJ:IEEE Press,2008:1173-1177.
[3] MAHDAVIFAR H,VARDY A.Achieving the secrecy capacity of wiretap channels using polar codes[C]//2010 IEEE International Symposium on Information Theory.Piscataway,NJ:IEEE Press,2010:913-917.
[4] MAHDAVIFAR H,VARDY A.Achieving the secrecy capacity of wiretap channels using polar codes[J].IEEE Transactions on Information Theory,2011,57(10):6428-6443.
[5] SASOGLU E,VARDY A.A new polar coding scheme for strong security on wiretap channels[C]//2013 IEEE International Symposium on Information Theory.Piscataway,NJ:IEEE Press,2013:1117-1121.
[6] WEI Y P,ULUKUS S.Polar coding for the general wiretap channel with extensions to multiuser scenarios[J].IEEE Journal on Selected Areas in Communications,2016,34(2):278-291.
[7] SI H,KOYLUOLU O O,VISHWANATH S.Achieving secrecy without any instantaneous CSI:Polar coding for fading wiretap channels[C]//2015 IEEE International Symposium on information Theory.Piscataway,NJ:IEEE Press,2015:2161-2165.
[8] YOUNGSIK K,JONGHWAN K,SANGHYO K.A secure information transmission scheme with a secret key based on polar coding[J].IEEE Communications Letters,2014,18(6):937-940.
[9] ZHAO Y Z,ZOU X C,LU Z J,et al.Chaotic encrypted polar coding scheme for general wiretap channel[J].IEEE Transactions on Very Large Scale Integration Systems,2017,25(12):3331-3340.
[10] MOSTAFA S,RONGKE L,CHENYU Z.A novel scrambler design for enhancing secrecy transmission based on polar code[J].IEEE Communications Letters,2017,21(8):1679-1682.
[11] MAZO J E.Faster-than-Nyquist signaling[J].Bell System Technical Journal,1975,54(8):1451-1462.
[12] ANDERSON J B,RUSEK F,OWALL V.Faster-than-Nyquist signaling[J].Proceedings of IEEE,2013,101(8):1817-1830.
[13] JOAN D.Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers[J].Computing,2009,85(1):85-104.
[14] JOAN D.New criteria for linear maps in AES like ciphers[J].Cryptography and Communications,2009,1(1):47-69.
[15] ELUMALAI R.Improving diffusion power of AES Rijindael with 8×8 MDS matrix[J].International Journal on Computer Science and Engineering,2011,3(1):246-253. |