Navigation

icon of pdf file published (link to publisher's online pdf) icon of preprint preprint (might differ from final version) icon of errata errata

Books - Journals - Conferences - Patents - Theses

Submitted or under revision

  1. Keerthi Suria Kumar Arumugam, Matthieu R Bloch, Covert Communication over a K user Multiple Access Channel, submitted to IEEE Transactions on Information Forensics and Security
  2. Giulia Cervia, Laura Luzzi, Mal Le Treust, Matthieu Bloch, Strong Coordination of Signals and Actions over Noisy Channels with two sided State Information, submitted to IEEE Transactions on Information Theory
  3. Hassan ZivariFard, Matthieu R Bloch, Aria Nosrtinia, The Two Transmitter Two Receiver Channel with Confidential Messages A Case Study on Relative Merits of two Achievability Techniques, submitted to IEEE International Sympoisum on Information Theory
  4. Noha Helhal, Matthieu R Bloch, Aria Nosratinia, Multiple Access Channel Resolvability with Cribbing, submitted to IEEE International Symposium on Information Theory
  5. Keerthi Arumugam, Matthieu R Bloch, Ligong Wang, Covert Communication over a Physically Degraded Relay Channel with Non Colluding Wardens, submitted to IEEE International Symposium on Information Theory
  6. Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R Bloch, Multilevel Coded Pulse Position Modulation for Covert Communications, submitted to IEEE International Symposium on Information Theory
  7. Mehrdad Tahmasbi, Matthieu R Bloch, First and Second Order Asymptotics in Covert Communication with Pulse Position Modulation, submitted after revision to IEEE Transactions on Information Theory
  8. Somayeh Salimi, Matthieu Bloch, Frederic Gabry, Mikael Skoglund, Panagiotis Papadimitratos, Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel, submitted to IEEE Transactions on Information Theory
    icon of preprint
  9. Alexandre J Pierrot, Remi A Chou, Matthieu R Bloch, The Effect of Eavesdroppers Statistics in Experimental Wireless Secret Key Generation, submitted to IEEE Transactions on Information Forensics and Security
    icon of preprint

To appear

  1. Remi A Chou, Matthieu R Bloch, Joerg Kliewer, Empirical and Strong Coordination via Soft Covering with Polar Codes, accepted to IEEE Transactions on Information Theory
    icon of pdf icon of preprint
  2. Hassan Zivari Fard, Matthieu Bloch, Aria Nosratinia, Two Transmitter Two Receiver Channel with Confidential Messages, accepted to Allerton Conference on Communication Control and Computing
  3. Benjamin Larrousse, Samson Lasaulce, Matthieu Bloch, Coordination in distributed networks via coded actions with application to power control, accepted in IEEE Transactions on Information Theory
    icon of pdf icon of preprint

Books and Book Chapters

  1. Jie Hou, Gerhard Kramer, Matthieu Bloch, Information Theoretic Security and Privacy of Information Systems, Cambridge University Press, 2017
    icon of pdf
  2. Matthieu R Bloch, Physical Layer Security in Wireless Communications, CRC Press, 2013
  3. Matthieu Bloch, Joao Barros, Physical Layer Security From Information Theory to Security Engineering, Cambridge University Press, October 2011
    icon of pdf

Journals

  1. Badri N Vellambi, Joerg Kliewer, Matthieu R Bloch, Strong Coordination Over Multi Hop Line Networks Using Channel Resolvability Codebooks, IEEE Transactions on Information Theory, Vol. 64, no. 2, pp. 1132-1162, Feb 2018
    icon of pdf
  2. R A Chou, B N Vellambi, M R Bloch, J Kliewer, Coding Schemes for Achieving Strong Secrecy at Negligible Cost, IEEE Transactions on Information Theory, Vol. 63, no. 3, pp. 1858-1873, March 2017
    icon of pdf
  3. Guillaume Freche, Matthieu Bloch, Michel Barret, Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels, Entropy, Vol. 20, no. 1, pp. 3, Dec 2017
    icon of pdf
  4. Remi A Chou, Matthieu R Bloch, Polar Coding for the Broadcast Channel with Confidential Messages A Random Binning Analogy, IEEE Transactions on Information Theory, Vol. 62, no. 5, pp. 2410-2429, May 2016
    icon of pdf
  5. Matthieu R Bloch, Covert Communication over Noisy Channels A Resolvability Perspective, IEEE Transactions on Information Theory, Vol. 62, no. 5, pp. 2334-2354, May 2016
    icon of pdf
  6. Remi A Chou, Matthieu R Bloch, Emmanuel Abbe, Polar Coding for Secret Key Generation, IEEE Transactions on Information Theory, Vol. 61, no. 11, pp. 6213-6237, November 2015
    icon of pdf
  7. Matthieu R Bloch, Masahito Hayashi, Andrew Thangaraj, Error Control Coding for Physical Layer Secrecy, Proceedings of IEEE, Vol. 103, no. 10, pp. 1725-1746, October 2015
    icon of pdf
  8. VYF Tan, MR Bloch, Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels, IEEE Transactions on Information Forensics and Security, Vol. 10, no. 9, pp. 1891-1904, September 2015
    icon of pdf
  9. Remi A Chou, Matthieu R Bloch, Separation of Reliability and Secrecy in Rate Limited Secret Key Distillation, IEEE Transactions on Information Theory, Vol. 60, no. 8, pp. 4941-4957, August 2014
    icon of pdf icon of preprint
  10. Nianqiang Li, Byungchil Kim, V N Chizhevsky, A Locquet, M Bloch, D S Citrin, Wei Pan, Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser, Optics Express, Vol. 22, no. 6, pp. 6634-6646, March 2014
    icon of pdf
  11. Matthieu R Bloch, J Nicholas Laneman, Strong Secrecy from Channel Resolvability, IEEE Transactions on Information Theory, Vol. 59, no. 12, pp. 8077-8098, December 2013
    icon of pdf icon of preprint
  12. Willie K Harrison, Joao Almeida, Matthieu R Bloch, Steven W McLaughlin, Joao Barros, Coding for Secrecy An Overview of Error Control Coding Techniques for Physical Layer Security, IEEE Signal Processing Magazine, Vol. 30, no. 5, pp. 41-50, September 2013
    icon of pdf
  13. Matthieu R Bloch, J Nicholas Laneman, Exploiting Partial Channel State Information for Secrecy over Wireless Channels, IEEE Journal on Selected Areas in Communications, Vol. 31, no. 9, pp. 1840-1849, September 2013
    icon of pdf
  14. Raef Bassily, Ersen Ekrem, Xiang He, Ender Tekin, Jianwei Xie, Matthieu Bloch, Sennur Ulukus, Aylin Yener, Cooperative Security at the Physical Layer A Summary of Recent Advances, IEEE Signal Processing Magazine, Vol. 30, no. 5, pp. 16-28, September 2013
    icon of pdf
  15. Francesco Renna, Matthieu R Bloch, Nicola Laurenti, Semi blind Key Agreement over MIMO Fading Channels, IEEE Transactions on Communications, Vol. 61, no. 2, pp. 620-627, February 2013
    icon of pdf
  16. Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven McLaughlin, Strong Secrecy on the Binary Erasure Wiretap Channel Using Large Girth LDPC Codes, IEEE Transactions on Information Forensics and Security, Vol. 6, no. 3, pp. 585-594, September 2011
    icon of pdf icon of preprint
  17. Alexandre J Pierrot, Matthieu R Bloch, Strongly Secure Communications Over the Two Way Wiretap Channel, IEEE Transactions on Information Forensics and Security, Vol. 6, no. 3, pp. 595-605, September 2011
    icon of pdf icon of preprint
  18. Joao Paulo Vilela, Matthieu Bloch, Joao Barros, Steven W McLaughlin, Wireless Secrecy Regions with Friendly Jamming, IEEE Transactions on Information Forensics and Security, Vol. 6, no. 2, pp. 256-266, June 2011
    icon of pdf
  19. Tan F Wong, Matthieu Bloch, John M Shea, Secret Sharing over Fast Fading MIMO Wiretap Channels, EURASIP Journal on Wireless Communications and Networking, Vol. 2009, pp. 506973/1-17, 2009
    icon of pdf icon of preprint
  20. Matthieu Bloch, Rajesh Narasimha, Steven W McLaughlin, Network Security for Client Server Architecture using Wiretap Codes, IEEE Transactions on Information Forensics and Security, Vol. 3, no. 3, pp. 404-413, September 2008
    icon of pdf
  21. Matthieu Bloch, Joao Barros, Miguel R D Rodrigues, Steven W McLaughlin, Wireless Information Theoretic Security, IEEE Transactions on Information Theory, Vol. 54, no. 6, pp. 2515-2534, June 2008
    icon of pdf icon of preprint icon of preprint
  22. Jerome Lodewyck, Matthieu Bloch, Raul Garcia Patron, Simon Fossier, Evgueni Karpov, Eleni Diamanti, Thierry Debuisschert, Nicolas J Cerf, Rosa Tualle Brouri, Steven W McLaughlin, Philippe Grangier, Quantum key distribution over 25 km with an all fiber continuous variable system, Physical Review A, Vol. 76, pp. 042305/1-10, October 2007
    icon of pdf icon of preprint
  23. Matthieu Bloch, Steven W McLaughlin, Frederic Patois, Jean Marc Merolla, Frequency Coded Quantum Key Distribution, Optics Letters, Vol. 32, no. 3, pp. 301-303, February 2007
    icon of pdf
  24. Stephane Donnet, Andrew Thangaraj, Matthieu Bloch, Johann Cussey, Jean Marc Merolla, Laurent Larger, Security of Y 00 under heterodyne measurement and fast correlation attack, Physics Letters A, Vol. 356, no. 6, pp. 406-410, August 2006
    icon of pdf

Conference proceedings

  1. K S K Arumugam, M R Bloch, Covert communication over broadcast channels, in Proc. Information Theory Workshop, Kaohsiung, Taiwan, November 2017, pp. 299-303
    icon of pdf
  2. Mehrdad Tahmasbi, Matthieu R Bloch, Vincent F Tan, Error exponents covert communications, in Proc. of IEEE Information Theory Workshop, Kaohsiung, Taiwan, November 2017, pp. 304-308
    icon of pdf
  3. Giulia Cervia, Laura Luzzi, Mael Le Treust, Matthieu R Bloch, Strong Coordination of Signals and Actions over Noisy Channels, in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, June 2017, pp. 2845-2849
  4. Ishaque Ashar Kadampot, Matthieu R Bloch, Coordination with Clustered Common Randomness in a Three Terminal Line Network, in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, June 2017, pp. 1828-1832
    icon of pdf
  5. Mehrdad Tahmasbi, Matthieu R Bloch, Aylin Yener, Learning Adversarys Actions for Secret Communication, in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, June 2017, pp. 2713-2717
    icon of pdf
  6. K S Kumar Arumugam, I A Kadampot, M Tahmasbi, S Shah, M Bloch, S Pokutta, Modulation recognition using side information and hybrid learning, in Proc. IEEE Int. Symp. Dynamic Spectrum Access Networks (DySPAN), , March 2017, pp. 1-2
    icon of pdf
  7. G Freche, M R Bloch, M Barret, Polar codes for covert communications over asynchronous Discrete Memoryless Channels, in Proc. of 51st Annual Conference on Information Sciences and Systems, , March 2017, pp. 1-1
    icon of pdf
  8. Ekaterina Shipilova, Jean Luc Boelle, Michel Barret, Matthieu Bloch, Jean Luc Collette, Separation of impulsive blended seismic sources using Orthogonal Matching Pursuit, in 76th Annual International Conference and Exhibition EAGE, , 2017
    icon of pdf
  9. Ekaterina Shipilova, Jean Luc Boelle, Matthieu Bloch, Michel Barret, Jean Luc Collette, Matrioshka orthogonal matching pursuit for blended seismic source separation, in SEG Technical Program Expanded Abstracts 2017, , 2017, pp. 4919-4924
    icon of pdf
  10. Mehrdad Tahmasbi, Matthieu R Bloch, Covert secret key generation, in Proc. of IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security, Las Vegas, NV, Oct 2017, pp. 540-544
    icon of pdf
  11. Matthieu R Bloch, Saikat Guha, Optimal Covert Communications using Pulse Position Modulation, in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, 2017, pp. 2835-2839
    icon of pdf
  12. G Cervia, L Luzzi, M R Bloch, M Le Treust, Polar coding for empirical coordination of signals and actions over noisy channels, in Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, September 2016, pp. 81-85
    icon of pdf
  13. K S K Arumugam, M R Bloch, Keyless asynchronous covert communication, in Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, September 2016, pp. 191-195
    icon of pdf
  14. Remi A Chou, Matthieu R Bloch, Aylin Yener, Universal covertness for Discrete Memoryless Sources, in 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, August 2016, pp. 516-523
    icon of pdf
  15. Badri N Vellambi, Jorg Kliewer, Matthieu R Bloch, Lossy Compression with Near uniform Encoder Outputs, in Proc. of IEEE International Symposium on Information Theory, , July 2016, pp. 530-534
    icon of pdf
  16. Mehrdad Tahmasbi, Matthieu R Bloch, Second Order Asymptotics of Covert Communications over Noisy Channels, in Proc. of IEEE International Symposium on Information Theory, , July 2016, pp. 2224-2228
    icon of pdf
  17. Mael Le Treust, Matthieu R Bloch, Empirical Coordination State Masking and State Amplification Core of the Decoders Knowledge, in Proc. of IEEE International Symposium on Information Theory, , July 2016, pp. 895-899
    icon of pdf
  18. Keerthi Suria Kumar Arumugam, Matthieu R Bloch, Keyless Covert Communication over Multiple Access Channels, in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, July 2016, pp. 2229-2233
    icon of pdf
  19. B N Vellambi, J Kliewer, M R Bloch, Strong coordination over a line when actions are Markovian, in Proc. of Annual Conference on Information Science and Systems, , March 2016, pp. 412-417
    icon of pdf
  20. Mehrdad Tahmasbi, Matthieu R Bloch, Second Order Asymptotics for Degraded Wiretap Channels How Good Are Existing Codes, in 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sept 2016, pp. 830-837
    icon of pdf
  21. R A Chou, M R Bloch, Using deterministic decisions for low entropy bits in the encoding and decoding of polar codes, in Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing, , September 2015, pp. 1380-1385
    icon of pdf
  22. Badri N Vellambi, Joerg Kliewer, Matthieu Bloch, Strong Coordination over Multi hop Line Networks, in Proc. of IEEE Information Theory Workshop, Jeju, Korea, July 2015, pp. 192-196
    icon of pdf
  23. Badri N Vellambi, Matthieu R Bloch, Remi A Chou, Joerg Kliewer, Lossless and Lossy Source Compression with Near Uniform Outputs Is Common Randomness Always Required, in Proc. of IEEE International Symposium on Information Theory, Hong Kong, June 2015, pp. 2171-2175
    icon of pdf
  24. Remi A Chou, Matthieu R Bloch, Joerg Kliewer, Polar Coding for Empirical and Strong Coordination via Distribution Approximation, in Proc. of IEEE International Symposium on Information Theory, Hong Kong, June 2015, pp. 1512-1516
    icon of pdf
  25. Matthieu R Bloch, A Channel Resolvability Perspective on Stealth Communications, in Proc. of IEEE International Symposium on Information Theory, Hong Kong, June 2015, pp. 2535-2539
    icon of pdf
  26. Remi A Chou, Matthieu R Bloch, Polar Coding for the Broadcast Channel with Confidential Messages, in Proc. IEEE Information Theory Workshop, Jerusalem, Israel, April 2015, pp. 1-5
    icon of pdf
  27. Remi A Chou, Matthieu R Bloch, Jorg Kliewer, Low Complexity Channel Resolvability Codes for the Symmetric Multiple Access Channel, in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, November 2014, pp. 466-470
    icon of pdf
  28. Matthieu R Bloch, Joerg Kliewer, Strong Coordination over a Three Terminal Relay Network, in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, November 2014, pp. 646-650
    icon of pdf
  29. Remi A Chou, Matthieu R Bloch, Uniform Distributed Source Coding for the Multiple Access Wiretap Channel, in Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, October 2014, pp. 127-132
    icon of pdf
  30. Vincent Y F Tan, Matthieu R Bloch, Information spectrum approach to strong converse theorems for degraded wiretap channels, in Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2014, pp. 747-754
    icon of pdf
  31. Nianqiang Li, Byungchil Kim, V N Chizhevsky, Alexandre Locquet, Matthieu Bloch, David Citrin, Wei Pan, Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser, in Proc. of CLEO, San Jose, CA, June 2014, pp. 1-2
  32. Joseph J Boutros, Volkan Dedeoglu, Matthieu R Bloch, The Anti Diversity Concept for Secure Communication on a Two Link Compound Channel, in Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, February 2014
    icon of pdf
  33. Remi A Chou, Matthieu R Bloch, Secret Key Generation with Arbitrarily Varying Eavesdroppers Channel, in Proc. of Global Conference on Signal and Information Processing, Austin, TX, September 2013, pp. 277-280
    icon of pdf
  34. Cong Ling, Laura Luzzi, Matthieu R Bloch, Secret key generation from Gaussian sources using lattice hashing, in Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, July 2013, pp. 2621-2625
    icon of pdf
  35. Remi A Chou, Matthieu R Bloch, Data compression with nearly uniform ouput, in Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, July 2013, pp. 1979-1983
    icon of pdf
  36. Matthieu R Bloch, Joerg Kliewer, Strong coordination over a line network, in Proc. IEEE International Symposium on Information Theory, Istanbul, Turkey, July 2013, pp. 2319-2323
    icon of pdf
  37. Francesco Renna, Nicola Laurenti, Stefano Tomasin, Marco Baldi, Nicola Maturo, Marco Bianchi, Franco Chiaraluce, Matthieu Bloch, Low power secret key agreement over OFDM, in Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budaptest, Hungary, April 2013, pp. 43-48
    icon of pdf
  38. Alexandre J Pierrot, Remi A Chou, Matthieu R Bloch, Experimental Aspects of Secret Key Generation in Indoor Wireless Environments, in Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, , April 2013
    icon of pdf
  39. Alexandre J Pierrot, Matthieu R Bloch, Joint Channel Intrinsic Randomness and Channel Resolvability, in Proc. of Information Theory Workshop, Sevilla, Spain, April 2013, pp. 1-5
    icon of pdf
  40. Remi A Chou, Matthieu R Bloch, Emmanuel Abbe, Polar Coding for Secret Key Generation, in Proc. of Information Theory Workshop, Sevilla, Spain, April 2013, pp. 1-5
    icon of pdf
  41. Matthieu R Bloch, Laura Luzzi, Joerg Kliewer, Strong Coordination with Polar Codes, in Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, October 2012, pp. 565-571
    icon of pdf
  42. Alexandre J Pierrot, Matthieu R Bloch, LDPC based coded cooperative jamming codes, in Proc. of IEEE Information Theory Workshop, Lausanne, Switzerland, September 2012, pp. 462-466
    icon of pdf
  43. Remi A Chou, Matthieu R Bloch, One way rate limited sequential key distillation, in Proc. IEEE International Symp.Information Theory, Cambridge, MA, July 2012, pp. 1777-1781
    icon of pdf
  44. Matthieu R Bloch, Joerg Kliewer, On secure communication with constrained randomization, in Proc. IEEE International Symp.Information Theory, Cambridge, MA, July 2012, pp. 1172-1176
    icon of pdf
  45. Matthieu R Bloch, Achieving Secrecy capacity vs Resolvability, in Proc. of IEEE International Symposium on Information Theory, Saint Petersburg, Russia, August 2011, pp. 632-636
    icon of pdf
  46. Francesco Renna, Matthieu Bloch, Nicola Laurenti, Semi Blind Key Agreement over MIMO Fading Channels, in Proc. IEEE International Conference on Communications, Kyoto, Japan, June 2011, pp. 1-6
    icon of pdf
  47. Laura Luzzi, Matthieu R Bloch, Capacity based random codes cannot achieve strong secrecy over symmetric wiretap channels, in Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, May 2011, pp. 641-647 (invited)
    icon of preprint
  48. Francesco Renna, Matthieu Bloch, Nicola Laurenti, Semi Blind Key Agreement over MIMO Quasi Static Channels, in Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, March 2011, pp. 1-6
  49. Ananda T Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven McLaughlin, Strong Secrecy for Erasure Wiretap Channels, in Proc. IEEE Information Theory Workshop, Dublin, Ireland, September 2010
    icon of pdf icon of preprint
  50. Arunkumar Subramanian, Ananda T Suresh, Andrew Thangaraj, Matthieu Bloch, Steven McLaughlin, Strong and Weak Secrecy in Wiretap Channels, in Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, September 2010, pp. 30 - 34 (invited)
    icon of pdf
  51. Matthieu Bloch, Channel Intrinsic Randomness, in Proc. of IEEE International Symposium on Information Theory, Austin, TX, June 2010, pp. 2607-2611
    icon of pdf
  52. Joao Paulo Vilela, Matthieu Bloch, Joao Barros, Steven W McLaughlin, Friendly Jamming for Wireless Secrecy, in Proc. of IEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1550-3607
    icon of pdf
  53. Miguel Rodrigues, Anelia Somekh Baruch, Matthieu Bloch, On Gaussian Wiretap Channels with Arbitrary Inputs, in Proc. of European Wireless, Lucca, Italy, April 2010, pp. 774-781
    icon of pdf
  54. Ebrahim MolavianJazi, Matthieu Bloch, J Nicholas Laneman, Arbitrary Jamming Can Preclude Secure Communications, in Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2009, pp. 1069-1075
    icon of pdf
  55. Matthieu Bloch, Channel Scrambling for Secrecy, in Proc. of IEEE International Symposium on Information Theory, Seoul, Korea, July 2009, pp. 2452-2456
    icon of pdf
  56. Brian P Dunn, Matthieu Bloch, J Nicholas Laneman, Secure bits through queues, in Proc. IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, June 2009, pp. 37-41
    icon of pdf
  57. Matthieu Bloch, J Nicholas Laneman, Information Spectrum Methods for Information Theoretic Security, in Proc. Information Theory and Applications Workshop, San Diego, CA, February 2009, pp. 23-28 (invited)
    icon of pdf
  58. Matthieu Bloch, J Nicholas Laneman, On the Secrecy Capacity of Arbitrary Wiretap Channels, in Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2008, pp. 818-825
    icon of pdf
  59. Joao Barros, Matthieu Bloch, Strong Secrecy for Wireless Channels, in Information Theoretic Security, Calgary, Canada, August 2008, pp. 40-53 (invited)
    icon of pdf
  60. Simon Fossier, J Lodewyck, E Diamanti, M Bloch, T Debuisschert, R Tualle Brouri, P Grangier, Quantum Key Distribution over 25 km Using a Fiber Setup Based on Continuous Variables, in Proc. of CLEO/QELS, San Jose, CA, May 2008, pp. 1-2
    icon of pdf icon of errata
  61. Matthieu Bloch, Andrew Thangaraj, Confidential Messages to a Cooperative Relay, in Proc. of the IEEE Information Theory Workshop, Porto, Portugal, May 2008, pp. 154-158
    icon of pdf
  62. Matthieu Bloch, Rajesh Narasimha, Steven W McLaughlin, Client Server Architecture Design based on Wiretap Codes, in Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, March 2008, pp. 44-47
    icon of pdf
  63. Eleni Diamanti, Simon Fossier, Jerome Lodewyck, Matthieu Bloch, Raul Garcia Patron, Evgueni Karpov, Thierry Debuisschert, Nicolas J Cerf, Rosa Tualle Brouri, Steven W McLaughlin, Philippe Grangier, Implementation of an all fiber continuous variables quantum key distribution system, in International Conference on Quantum Information Processing and Communication, Barcelona, Spain, October 2007
  64. J Lodewyck, M Bloch, R Garcia Patron, S Fossier, E Karpov, E Diamanti, T Debuisschert, N J Cerf, R Tualle Brouri, S W McLaughlin, P Grangier, Quantum key distribution device with coherent states, in Proc. of SPIE Optics East, Boston, MA, USA, September 2007, pp. 67800Z/1-14 (invited)
    icon of pdf
  65. Matthieu Bloch, Joao Barros, Steven W McLaughlin, Practical Information Theoretic Commitment, in Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, September 2007, pp. 1035-1039
  66. Jerome Lodewyck, Matthieu Bloch, Simon Fossier, Eleni Diamanti, Thierry Debuisschert, Rosa Tualle Brouri, Philippe Grangier, Distribution quantique de cle a 25 km au moyen dun dispositif fibre utilisant des variables continues, in 10eme Colloque sur les Lasers et l'Optique Quantique, Grenoble, France, July 2007
    icon of pdf
  67. Sunil Kaimalettu, Andrew Thangaraj, Matthieu Bloch, Steven W McLaughlin, Constellation Shaping using LDPC Codes, in Proc. IEEE International Symposium on Information Theory, Nice, France, June 2007, pp. 2366-2370
    icon of pdf
  68. Matthieu Bloch, Joao Barros, Miguel R D Rodrigues, Steven W McLaughlin, Information Theoretic Security for Wireless Channels Theory and Practice, in Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, February 2007 (invited)
  69. Matthieu Bloch, Joao Barros, Miguel R D Rodrigues, Steven W McLaughlin, LDPC based Secure Wireless Communication with Imperfect Knowledge of the Eavesdroppers Channels, in Proc. IEEE Information Theory Workshop, Chengdu, China, October 2006, pp. 155-159
    icon of pdf
  70. Stephane Donnet, Andrew Thangaraj, Matthieu Bloch, Johann Cussey, Jean Marc Merolla, Laurent Larger, Cryptanalysis of Y 00 under Heterodyne Measurement and Fast Correlation Attack, in Proc. European Conference on Optical Communication, Cannes, France, September 2006, pp. 1-2
    icon of pdf
  71. Matthieu Bloch, Joao Barros, Miguel R D Rodrigues, Steven W McLaughlin, An Opportunistic Physical Layer Approach to Secure Wireless Communications, in Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, September 2006, pp. 849-854
  72. Matthieu Bloch, Andrew Thangaraj, Steven W McLaughlin, Jean Marc Merolla, LDPC based Secret Key Agreement over the Gaussian wiretap channel, in Proc. IEEE International Symposium on Information Theory, Seattle, USA, July 2006, pp. 1179-1183
    icon of pdf
  73. Matthieu Bloch, Andrew Thangaraj, Steven W McLaughlin, Jean Marc Merolla, LDPC based Gaussian Key Reconciliation, in Proc. IEEE Information Theory Workshop, Punta del Este, Uruguay, March 2006, pp. 116-120
    icon of pdf icon of preprint
  74. Johann Cussey, Matthieu Bloch, Andrew Thangaraj, Jean Marc Merolla, Steven W McLaughlin, Integrated Direct Modulation Based Quantum Cryptography System, in Proc. Optical Network and Technologies, Pisa, Italy, October 2004, pp. 390-395
    icon of pdf
  75. Johann Cussey, Matthieu Bloch, Andrew Thangaraj, Jean Marc Merolla, Steven W McLaughlin, Direct Modulation Scheme for Free Space Quantum Cryptography, in Proc. European Conference on Optical Communication, Stockholm, Sweden, September 2004

Patents

  1. Matthieu Bloch, Jean Marc Merolla, System and method for the secure transmission of binary code by phase and intensity modulation, June 2013
  2. Matthieu Bloch, Joao Barros, Miguel Rodrigues, Steven W McLaughlin, Systems and Methods for Providing Opportunistic Security for Physical Communication Channels, July 2012

Theses

  1. Matthieu Bloch, Physical Layer Security, Georgia Institute of Technology, August 2008
    icon of pdf
  2. Matthieu Bloch, Reconciliation algorithm and quantum key distribution methods adapted for the frequency domain, Universite de Franche Comte, December 2006
    icon of pdf


Links