Navigation

icon of pdf file published (link to publisher's online pdf) icon of preprint preprint (might differ from final version) icon of errata errata

Books - Journals - Conferences - Patents - Theses

Submitted or under revision

  1. Badri N Vellambi, Joerg Kliewer, Matthieu R Bloch, Strong Coordination over Multi hop Line Networks, submitted to IEEE Transactions on Information Theory
    icon of preprint
  2. Somayeh Salimi, Matthieu Bloch, Frederic Gabry, Mikael Skoglund, Panagiotis Papadimitratos, Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel, submitted to IEEE Transactions on Information Theory
    icon of preprint
  3. Remi A Chou, Matthieu R Bloch, Joerg Kliewer, Coding Schemes for Achieving Strong Secrecy at Negligible Cost, submitted to IEEE Transactions on Information Theory
    icon of preprint
  4. Benjamin Larrousse, Samson Lasaulce, Matthieu Bloch, Coordination in distributed networks via coded actions with application to power control, submitted to IEEE Transactions on Information Theory
    icon of preprint
  5. Alexandre J Pierrot, Remi A Chou, Matthieu R Bloch, The Effect of Eavesdroppers Statistics in Experimental Wireless Secret Key Generation, submitted to IEEE Transactions on Information Forensics and Security
    icon of preprint

To appear

  1. Keerthi Suria Kumar Arumugam, Matthieu R Bloch, Keyless Covert Communication over Multiple Access Channels, accepted to IEEE International Symposium on Information Theory
  2. Keerthi Suria Kumar Arumugam, Matthieu R Bloch, Keyless Asynchronous Covert Communication, accepted to IEEE Information Theory Workshop
  3. Giula Cervia, Laura Luzzi, Matthieu Bloch, Mael Le Treust, Polar coding for empirical coordination of signals and actions over noisy channels, accepted to IEEE Information Theory Workshop
  4. Mael Le Treust, Matthieu R Bloch, Empirical Coordination State Masking and State Amplification Core of the Decoders Knowledge, accepted to IEEE International Symposium on Information Theory
  5. Mehrdad Tahmasbi, Matthieu R Bloch, Second Order Asymptotics of Covert Communications over Noisy Channels, accepted to IEEE International Symposium on Information Theory
  6. Badri N Vellambi, Jorg Kliewer, Matthieu R Bloch, Lossy Compression with Near uniform Encoder Outputs, accepted to IEEE International Symposium on Information Theory

Books and Book Chapters

  1. Matthieu Bloch, Joao Barros, Physical Layer Security From Information Theory to Security Engineering, Cambridge University Press, October 2011
    icon of pdf
  2. Matthieu R Bloch, Physical Layer Security in Wireless Communications, CRC Press, 2013

Journals

  1. Remi A Chou, Matthieu R Bloch, Polar Coding for the Broadcast Channel with Confidential Messages A Random Binning Analogy, IEEE Transactions on Information Theory, Vol. 62, no. 5, pp. 2410-2429, May 2016
    icon of pdf
  2. Matthieu R Bloch, Covert Communication over Noisy Channels A Resolvability Perspective, IEEE Transactions on Information Theory, Vol. 62, no. 5, pp. 2334-2354, May 2016
    icon of pdf
  3. Remi A Chou, Matthieu R Bloch, Emmanuel Abbe, Polar Coding for Secret Key Generation, IEEE Transactions on Information Theory, Vol. 61, no. 11, pp. 6213-6237, November 2015
    icon of pdf
  4. Matthieu R Bloch, Masahito Hayashi, Andrew Thangaraj, Error Control Coding for Physical Layer Secrecy, Proceedings of IEEE, Vol. 103, no. 10, pp. 1725-1746, October 2015
    icon of pdf
  5. VYF Tan, MR Bloch, Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels, IEEE Transactions on Information Forensics and Security, Vol. 10, no. 9, pp. 1891-1904, September 2015
    icon of pdf
  6. Remi A Chou, Matthieu R Bloch, Separation of Reliability and Secrecy in Rate Limited Secret Key Distillation, IEEE Transactions on Information Theory, Vol. 60, no. 8, pp. 4941-4957, August 2014
    icon of pdf icon of preprint
  7. Nianqiang Li, Byungchil Kim, V N Chizhevsky, A Locquet, M Bloch, D S Citrin, Wei Pan, Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser, Optics Express, Vol. 22, no. 6, pp. 6634-6646, March 2014
    icon of pdf
  8. Matthieu R Bloch, J Nicholas Laneman, Strong Secrecy from Channel Resolvability, IEEE Transactions on Information Theory, Vol. 59, no. 12, pp. 8077-8098, December 2013
    icon of pdf icon of preprint
  9. Willie K Harrison, Joao Almeida, Matthieu R Bloch, Steven W McLaughlin, Joao Barros, Coding for Secrecy An Overview of Error Control Coding Techniques for Physical Layer Security, IEEE Signal Processing Magazine, Vol. 30, no. 5, pp. 41-50, September 2013
    icon of pdf
  10. Matthieu R Bloch, J Nicholas Laneman, Exploiting Partial Channel State Information for Secrecy over Wireless Channels, IEEE Journal on Selected Areas in Communications, Vol. 31, no. 9, pp. 1840-1849, September 2013
    icon of pdf
  11. Raef Bassily, Ersen Ekrem, Xiang He, Ender Tekin, Jianwei Xie, Matthieu Bloch, Sennur Ulukus, Aylin Yener, Cooperative Security at the Physical Layer A Summary of Recent Advances, IEEE Signal Processing Magazine, Vol. 30, no. 5, pp. 16-28, September 2013
    icon of pdf
  12. Francesco Renna, Matthieu R Bloch, Nicola Laurenti, Semi blind Key Agreement over MIMO Fading Channels, IEEE Transactions on Communications, Vol. 61, no. 2, pp. 620-627, February 2013
    icon of pdf
  13. Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven McLaughlin, Strong Secrecy on the Binary Erasure Wiretap Channel Using Large Girth LDPC Codes, IEEE Transactions on Information Forensics and Security, Vol. 6, no. 3, pp. 585-594, September 2011
    icon of pdf icon of preprint
  14. Alexandre J Pierrot, Matthieu R Bloch, Strongly Secure Communications Over the Two Way Wiretap Channel, IEEE Transactions on Information Forensics and Security, Vol. 6, no. 3, pp. 595-605, September 2011
    icon of pdf icon of preprint
  15. Joao Paulo Vilela, Matthieu Bloch, Joao Barros, Steven W McLaughlin, Wireless Secrecy Regions with Friendly Jamming, IEEE Transactions on Information Forensics and Security, Vol. 6, no. 2, pp. 256-266, June 2011
    icon of pdf
  16. Tan F Wong, Matthieu Bloch, John M Shea, Secret Sharing over Fast Fading MIMO Wiretap Channels, EURASIP Journal on Wireless Communications and Networking, Vol. 2009, pp. 506973/1-17, 2009
    icon of pdf icon of preprint
  17. Matthieu Bloch, Rajesh Narasimha, Steven W McLaughlin, Network Security for Client Server Architecture using Wiretap Codes, IEEE Transactions on Information Forensics and Security, Vol. 3, no. 3, pp. 404-413, September 2008
    icon of pdf
  18. Matthieu Bloch, Joao Barros, Miguel R D Rodrigues, Steven W McLaughlin, Wireless Information Theoretic Security, IEEE Transactions on Information Theory, Vol. 54, no. 6, pp. 2515-2534, June 2008
    icon of pdf icon of preprint icon of preprint
  19. Jerome Lodewyck, Matthieu Bloch, Raul Garcia Patron, Simon Fossier, Evgueni Karpov, Eleni Diamanti, Thierry Debuisschert, Nicolas J Cerf, Rosa Tualle Brouri, Steven W McLaughlin, Philippe Grangier, Quantum key distribution over 25 km with an all fiber continuous variable system, Physical Review A, Vol. 76, pp. 042305/1-10, October 2007
    icon of pdf icon of preprint
  20. Matthieu Bloch, Steven W McLaughlin, Frederic Patois, Jean Marc Merolla, Frequency Coded Quantum Key Distribution, Optics Letters, Vol. 32, no. 3, pp. 301-303, February 2007
    icon of pdf
  21. Stephane Donnet, Andrew Thangaraj, Matthieu Bloch, Johann Cussey, Jean Marc Merolla, Laurent Larger, Security of Y 00 under heterodyne measurement and fast correlation attack, Physics Letters A, Vol. 356, no. 6, pp. 406-410, August 2006
    icon of pdf

Conference proceedings

  1. B N Vellambi, J Kliewer, M R Bloch, Strong coordination over a line when actions are Markovian, in Proc. of Annual Conference on Information Science and Systems, , March 2016, pp. 412-417
    icon of pdf
  2. R A Chou, M R Bloch, Using deterministic decisions for low entropy bits in the encoding and decoding of polar codes, in Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing, , September 2015, pp. 1380-1385
    icon of pdf
  3. Badri N Vellambi, Joerg Kliewer, Matthieu Bloch, Strong Coordination over Multi hop Line Networks, in Proc. of IEEE Information Theory Workshop, Jeju, Korea, July 2015, pp. 192-196
    icon of pdf
  4. Badri N Vellambi, Matthieu R Bloch, Remi A Chou, Joerg Kliewer, Lossless and Lossy Source Compression with Near Uniform Outputs Is Common Randomness Always Required, in Proc. of IEEE International Symposium on Information Theory, Hong Kong, June 2015, pp. 2171-2175
    icon of pdf
  5. Remi A Chou, Matthieu R Bloch, Joerg Kliewer, Polar Coding for Empirical and Strong Coordination via Distribution Approximation, in Proc. of IEEE International Symposium on Information Theory, Hong Kong, June 2015, pp. 1512-1516
    icon of pdf
  6. Matthieu R Bloch, A Channel Resolvability Perspective on Stealth Communications, in Proc. of IEEE International Symposium on Information Theory, Hong Kong, June 2015, pp. 2535-2539
    icon of pdf
  7. Remi A Chou, Matthieu R Bloch, Polar Coding for the Broadcast Channel with Confidential Messages, in Proc. IEEE Information Theory Workshop, Jerusalem, Israel, April 2015, pp. 1-5
    icon of pdf
  8. Remi A Chou, Matthieu R Bloch, Jorg Kliewer, Low Complexity Channel Resolvability Codes for the Symmetric Multiple Access Channel, in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, November 2014, pp. 466-470
    icon of pdf
  9. Matthieu R Bloch, Joerg Kliewer, Strong Coordination over a Three Terminal Relay Network, in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, November 2014, pp. 646-650
    icon of pdf
  10. Remi A Chou, Matthieu R Bloch, Uniform Distributed Source Coding for the Multiple Access Wiretap Channel, in Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, October 2014, pp. 127-132
    icon of pdf
  11. Vincent Y F Tan, Matthieu R Bloch, Information spectrum approach to strong converse theorems for degraded wiretap channels, in Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2014, pp. 747-754
    icon of pdf
  12. Nianqiang Li, Byungchil Kim, V N Chizhevsky, Alexandre Locquet, Matthieu Bloch, David Citrin, Wei Pan, Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser, in Proc. of CLEO, San Jose, CA, June 2014, pp. 1-2
  13. Joseph J Boutros, Volkan Dedeoglu, Matthieu R Bloch, The Anti Diversity Concept for Secure Communication on a Two Link Compound Channel, in Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, February 2014
    icon of pdf
  14. Remi A Chou, Matthieu R Bloch, Secret Key Generation with Arbitrarily Varying Eavesdroppers Channel, in Proc. of Global Conference on Signal and Information Processing, Austin, TX, September 2013, pp. 277-280
    icon of pdf
  15. Cong Ling, Laura Luzzi, Matthieu R Bloch, Secret key generation from Gaussian sources using lattice hashing, in Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, July 2013, pp. 2621-2625
    icon of pdf
  16. Remi A Chou, Matthieu R Bloch, Data compression with nearly uniform ouput, in Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, July 2013, pp. 1979-1983
    icon of pdf
  17. Matthieu R Bloch, Joerg Kliewer, Strong coordination over a line network, in Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, July 2013, pp. 2319-2323
    icon of pdf
  18. Francesco Renna, Nicola Laurenti, Stefano Tomasin, Marco Baldi, Nicola Maturo, Marco Bianchi, Franco Chiaraluce, Matthieu Bloch, Low power secret key agreement over OFDM, in Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budaptest, Hungary, April 2013, pp. 43-48
    icon of pdf
  19. Alexandre J Pierrot, Remi A Chou, Matthieu R Bloch, Experimental Aspects of Secret Key Generation in Indoor Wireless Environments, in Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, , April 2013
    icon of pdf
  20. Alexandre J Pierrot, Matthieu R Bloch, Joint Channel Intrinsic Randomness and Channel Resolvability, in Proc. of Information Theory Workshop, Sevilla, Spain, April 2013, pp. 1-5
    icon of pdf
  21. Remi A Chou, Matthieu R Bloch, Emmanuel Abbe, Polar Coding for Secret Key Generation, in Proc. of Information Theory Workshop, Sevilla, Spain, April 2013, pp. 1-5
    icon of pdf
  22. Matthieu R Bloch, Laura Luzzi, Joerg Kliewer, Strong Coordination with Polar Codes, in Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, October 2012, pp. 565-571
    icon of pdf
  23. Alexandre J Pierrot, Matthieu R Bloch, LDPC based coded cooperative jamming codes, in Proc. of IEEE Information Theory Workshop, Lausanne, Switzerland, September 2012, pp. 462-466
    icon of pdf
  24. Remi A Chou, Matthieu R Bloch, One way rate limited sequential key distillation, in Proc. IEEE International Symp.Information Theory, Cambridge, MA, July 2012, pp. 1777-1781
    icon of pdf
  25. Matthieu R Bloch, Joerg Kliewer, On secure communication with constrained randomization, in Proc. IEEE International Symp.Information Theory, Cambridge, MA, July 2012, pp. 1172-1176
    icon of pdf
  26. Matthieu R Bloch, Achieving Secrecy capacity vs Resolvability, in Proc. of IEEE International Symposium on Information Theory, Saint Petersburg, Russia, August 2011, pp. 632-636
    icon of pdf
  27. Francesco Renna, Matthieu Bloch, Nicola Laurenti, Semi Blind Key Agreement over MIMO Fading Channels, in Proc. IEEE International Conference on Communications, Kyoto, Japan, June 2011, pp. 1-6
    icon of pdf
  28. Laura Luzzi, Matthieu R Bloch, Capacity based random codes cannot achieve strong secrecy over symmetric wiretap channels, in Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, May 2011, pp. 641-647 (invited)
    icon of preprint
  29. Francesco Renna, Matthieu Bloch, Nicola Laurenti, Semi Blind Key Agreement over MIMO Quasi Static Channels, in Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, March 2011, pp. 1-6
  30. Ananda T Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven McLaughlin, Strong Secrecy for Erasure Wiretap Channels, in Proc. IEEE Information Theory Workshop, Dublin, Ireland, September 2010
    icon of pdf icon of preprint
  31. Arunkumar Subramanian, Ananda T Suresh, Andrew Thangaraj, Matthieu Bloch, Steven McLaughlin, Strong and Weak Secrecy in Wiretap Channels, in Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, September 2010, pp. 30 - 34 (invited)
    icon of pdf
  32. Matthieu Bloch, Channel Intrinsic Randomness, in Proc. of IEEE International Symposium on Information Theory, Austin, TX, June 2010, pp. 2607-2611
    icon of pdf
  33. Joao Paulo Vilela, Matthieu Bloch, Joao Barros, Steven W McLaughlin, Friendly Jamming for Wireless Secrecy, in Proc. of IEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1550-3607
    icon of pdf
  34. Miguel Rodrigues, Anelia Somekh Baruch, Matthieu Bloch, On Gaussian Wiretap Channels with Arbitrary Inputs, in Proc. of European Wireless, Lucca, Italy, April 2010, pp. 774-781
    icon of pdf
  35. Ebrahim MolavianJazi, Matthieu Bloch, J Nicholas Laneman, Arbitrary Jamming Can Preclude Secure Communications, in Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2009, pp. 1069-1075
    icon of pdf
  36. Matthieu Bloch, Channel Scrambling for Secrecy, in Proc. of IEEE International Symposium on Information Theory, Seoul, Korea, July 2009, pp. 2452-2456
    icon of pdf
  37. Brian P Dunn, Matthieu Bloch, J Nicholas Laneman, Secure bits through queues, in Proc. IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, June 2009, pp. 37-41
    icon of pdf
  38. Matthieu Bloch, J Nicholas Laneman, Information Spectrum Methods for Information Theoretic Security, in Proc. Information Theory and Applications Workshop, San Diego, CA, February 2009, pp. 23-28 (invited)
    icon of pdf
  39. Matthieu Bloch, J Nicholas Laneman, On the Secrecy Capacity of Arbitrary Wiretap Channels, in Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2008, pp. 818-825
    icon of pdf
  40. Joao Barros, Matthieu Bloch, Strong Secrecy for Wireless Channels, in Information Theoretic Security, Calgary, Canada, August 2008, pp. 40-53 (invited)
    icon of pdf
  41. Simon Fossier, J Lodewyck, E Diamanti, M Bloch, T Debuisschert, R Tualle Brouri, P Grangier, Quantum Key Distribution over 25 km Using a Fiber Setup Based on Continuous Variables, in Proc. of CLEO/QELS, San Jose, CA, May 2008, pp. 1-2
    icon of pdf icon of errata
  42. Matthieu Bloch, Andrew Thangaraj, Confidential Messages to a Cooperative Relay, in Proc. of the IEEE Information Theory Workshop, Porto, Portugal, May 2008, pp. 154-158
    icon of pdf
  43. Matthieu Bloch, Rajesh Narasimha, Steven W McLaughlin, Client Server Architecture Design based on Wiretap Codes, in Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, March 2008, pp. 44-47
    icon of pdf
  44. Eleni Diamanti, Simon Fossier, Jerome Lodewyck, Matthieu Bloch, Raul Garcia Patron, Evgueni Karpov, Thierry Debuisschert, Nicolas J Cerf, Rosa Tualle Brouri, Steven W McLaughlin, Philippe Grangier, Implementation of an all fiber continuous variables quantum key distribution system, in International Conference on Quantum Information Processing and Communication, Barcelona, Spain, October 2007
  45. J Lodewyck, M Bloch, R Garcia Patron, S Fossier, E Karpov, E Diamanti, T Debuisschert, N J Cerf, R Tualle Brouri, S W McLaughlin, P Grangier, Quantum key distribution device with coherent states, in Proc. of SPIE Optics East, Boston, MA, USA, September 2007, pp. 67800Z/1-14 (invited)
    icon of pdf
  46. Matthieu Bloch, Joao Barros, Steven W McLaughlin, Practical Information Theoretic Commitment, in Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, September 2007, pp. 1035-1039
  47. Jerome Lodewyck, Matthieu Bloch, Simon Fossier, Eleni Diamanti, Thierry Debuisschert, Rosa Tualle Brouri, Philippe Grangier, Distribution quantique de cle a 25 km au moyen dun dispositif fibre utilisant des variables continues, in 10eme Colloque sur les Lasers et l'Optique Quantique, Grenoble, France, July 2007
    icon of pdf
  48. Sunil Kaimalettu, Andrew Thangaraj, Matthieu Bloch, Steven W McLaughlin, Constellation Shaping using LDPC Codes, in Proc. IEEE International Symposium on Information Theory, Nice, France, June 2007, pp. 2366-2370
    icon of pdf
  49. Matthieu Bloch, Joao Barros, Miguel R D Rodrigues, Steven W McLaughlin, Information Theoretic Security for Wireless Channels Theory and Practice, in Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, February 2007 (invited)
  50. Matthieu Bloch, Joao Barros, Miguel R D Rodrigues, Steven W McLaughlin, LDPC based Secure Wireless Communication with Imperfect Knowledge of the Eavesdroppers Channels, in Proc. IEEE Information Theory Workshop, Chengdu, China, October 2006, pp. 155-159
    icon of pdf
  51. Stephane Donnet, Andrew Thangaraj, Matthieu Bloch, Johann Cussey, Jean Marc Merolla, Laurent Larger, Cryptanalysis of Y 00 under Heterodyne Measurement and Fast Correlation Attack, in Proc. European Conference on Optical Communication, Cannes, France, September 2006, pp. 1-2
    icon of pdf
  52. Matthieu Bloch, Joao Barros, Miguel R D Rodrigues, Steven W McLaughlin, An Opportunistic Physical Layer Approach to Secure Wireless Communications, in Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, September 2006, pp. 849-854
  53. Matthieu Bloch, Andrew Thangaraj, Steven W McLaughlin, Jean Marc Merolla, LDPC based Secret Key Agreement over the Gaussian wiretap channel, in Proc. IEEE International Symposium on Information Theory, Seattle, USA, July 2006, pp. 1179-1183
    icon of pdf
  54. Matthieu Bloch, Andrew Thangaraj, Steven W McLaughlin, Jean Marc Merolla, LDPC based Gaussian Key Reconciliation, in Proc. IEEE Information Theory Workshop, Punta del Este, Uruguay, March 2006, pp. 116-120
    icon of pdf icon of preprint
  55. Johann Cussey, Matthieu Bloch, Andrew Thangaraj, Jean Marc Merolla, Steven W McLaughlin, Integrated Direct Modulation Based Quantum Cryptography System, in Proc. Optical Network and Technologies, Pisa, Italy, October 2004, pp. 390-395
    icon of pdf
  56. Johann Cussey, Matthieu Bloch, Andrew Thangaraj, Jean Marc Merolla, Steven W McLaughlin, Direct Modulation Scheme for Free Space Quantum Cryptography, in Proc. European Conference on Optical Communication, Stockholm, Sweden, September 2004

Patents

  1. Matthieu Bloch, Joao Barros, Miguel Rodrigues, Steven W McLaughlin, Systems and Methods for Providing Opportunistic Security for Physical Communication Channels, July 2012
  2. Matthieu Bloch, Jean Marc Merolla, System and method for the secure transmission of binary code by phase and intensity modulation, June 2013

Theses

  1. Matthieu Bloch, Reconciliation algorithm and quantum key distribution methods adapted for the frequency domain, Universite de Franche Comte, December 2006
    icon of pdf
  2. Matthieu Bloch, Physical Layer Security, Georgia Institute of Technology, August 2008
    icon of pdf


Research links