publications

publications by categories in reversed chronological order.

under review - accepted - articles - conference proceedings

: abstract - : BibTeX - : arXiv preprint - : published manuscript

under review

  1. O. Günlü, M. R. Bloch, and R. Schaeffer, “Private Remote Sources for Secure Multi-Function Computation.” submitted to IEEE Transactions on Information Theory, Jun. 2021.
  2. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication via Channel State Information.” submitted to IEEE Transactions on Information Theory, Mar. 2020.
  3. E. Zhang, M. Bloch, M. Bakshi, and S. Jaggi, “Undetectable Radios: Covert Communication under Spectral Mask Constraints.” submitted to IEEE Transactions on Information Theory, Dec. 2019.
  4. S. Salimi, M. Bloch, F. Gabry, M. Skoglund, and P. Papadimitratos, “Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel.” submitted to IEEE Transactions on Information Theory, Mar. 2016.
  5. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “The Effect of Eavesdropper’s Statistics in Experimental Wireless Secret-Key Generation.” submitted to IEEE Transactions on Information Forensics and Security, Jun. 2014.

accepted

  1. S.-Y. Wang and M. R. Bloch, “Covert MIMO Communications under Variational Distance Constraint.” accepted to IEEE Transactions on Information Forensics and Security, Aug. 2021.
  2. U. Pereg, R. Ferrara, and M. R. Bloch, “Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels.” accepted to IEEE Information Theory Workshop, Aug. 2021.
  3. M.-C. Chang and M. R. Bloch, “Covert Sequential Hypothesis Testing.” accepted to IEEE Information Theory Workshop, Aug. 2021.
  4. M. E. Cao, M. Bloch, and S. Coogan, “Estimating High Probability Reachable Sets using Gaussian Processes.” accepted to IEEE Conference on Decision and Control, Jul. 2021.
  5. J. Sun, S. Debnath, M. R. Bloch, and M. Saeedifard, “A Hybrid DC Fault Primary Protection Algorithm for Multi-Terminal HVdc Systems.” accepted to IEEE Transactions on Power Delivery, May 2021.
  6. S.-Y. Wang and M. R. Bloch, “Explicit Design of Provably Covert Channel Codes.” accepted to IEEE International Symposium on Information Theory, Apr. 2021.
  7. M.-C. Chang and M. R. Bloch, “Covert Authentication Against a Myopic Adversary.” accepted to IEEE International Symposium on Information Theory, Apr. 2021.
  8. M. Tahmasbi, B. Bash, S. Guha, and M. R. Bloch, “Signaling for Covert Quantum Sensing.” accepted to IEEE International Symposium on Information Theory, Apr. 2021.
  9. O. Günlü, M. Bloch, and R. F. Schaefer, “Secure Multi-Function Computation with Private Remote Sources.” accepted to IEEE International Symposium on Information Theory, Apr. 2021.
  10. H. ZivariFard, M. Bloch, and A. Nosratinia, “Covert Communication via Non-Causal Cribbing from a Cooperative Jammer.” accepted to IEEE International Symposium on Information Theory, Apr. 2021.
  11. N. Blinn, J. Boerger, and M. R. Bloch, “mmWave Beam Steering with Hierarchical Optimal Sampling for Unimodal Bandits.” accepted to the IEEE 2021 IEEE International Conference on Communications, Jan. 2021.

articles

  1. R. A. Chou, M. Bloch, and A. Yener, “Universal Covertness for Discrete Memoryless Sources,” IEEE Transactions on Information Theory, vol. 67, no. 8, pp. 1557–9654, Aug. 2021.
  2. M.-C. Chang and M. R. Bloch, “Evasive Active Hypothesis Testing,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 2, pp. 735–746, Jun. 2021.
  3. M. Bloch et al., “An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5–22, Mar. 2021.
  4. M. Tahmasbi and M. R. Bloch, “On Covert Quantum Sensing and the Benefits of Entanglement,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 352–365, Mar. 2021.
  5. M. Le Treust and M. R. Bloch, “State Leakage and Coordination of Actions: Core of the Receiver’s Knowledge,” IEEE Transactions on Information Theory, vol. 67, no. 2, pp. 805–823, Feb. 2021.
  6. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Two-Multicast Channel with Confidential Messages,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2743–2758, 2021.
  7. M. Tahmasbi and M. R. Bloch, “Covert and secret key expansion over quantum channels under collective attacks,” IEEE Transactions on Information Theory, vol. 66, no. 11, pp. 7113–7131, Nov. 2020.
  8. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels,” IEEE Transactions on Information Theory, vol. 66, no. 10, pp. 6001–6023, Oct. 2020.
  9. N. Helal, M. Bloch, and A. Nosratinia, “Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel,” IEEE Transactions on Information Theory, vol. 66, no. 9, pp. 5429–5447, Sep. 2020.
  10. M. Tahmasbi and M. R. Bloch, “Towards Undetectable Quantum Key Distribution over Bosonic Channels,” IEEE Journal on Selected Areas in Information Theory, vol. 1, no. 2, pp. 585–598, Aug. 2020.
  11. M. Tahmasbi and M. R. Bloch, “Steganography Protocols for Quantum Channels,” Journal of Mathematical Physics, vol. 61, no. 8, p. 082201, Aug. 2020.
  12. G. Cervia, L. Luzzi, M. Le Treust, and M. Bloch, “Strong Coordination of Signals and Actions over Noisy Channels with two-sided State Information,” IEEE Transactions on Information Theory, vol. 66, no. 8, pp. 4681–4708, Aug. 2020.
  13. E. Shipilova, M. Barret, M. Bloch, J.-L. Boelle, and J.-L. Collette, “Simultaneous seismic sources separation based on Matrioshka Orthogonal Matching Pursuit, Application in Oil and Gas Exploration,” IEEE Transactions on Geoscience and Remote Sensing, vol. 58, no. 7, pp. 4529–4546, Jul. 2020.
  14. M. Tahmasbi and M. R. Bloch, “Covert Secret Key Generation with an Active Warden,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1026–1039, Jun. 2020.
  15. M. Tahmasbi, A. Savard, and M. R. Bloch, “Covert Capacity of Non-Coherent Rayleigh-Fading Channels,” IEEE Transactions on Information Theory, vol. 66, no. 4, pp. 1979–2005, Apr. 2020.
  16. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning an Adversary’s Actions for Secret Communication,” IEEE Transactions on Information Theory, vol. 66, no. 3, pp. 1607–1624, Mar. 2020.
  17. K. S. K. Arumugam and M. R. Bloch, “Covert Communication over a K-User Multiple Access Channel,” IEEE Transactions on Information Theory, vol. 65, no. 11, pp. 7020–7044, Nov. 2019.
  18. K. S. K. Arumugam and M. R. Bloch, “Embedding Covert Information in Broadcast Communications,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2787–2801, Oct. 2019.
  19. M. Tahmasbi and M. R. Bloch, “Framework for covert and secret key expansion over classical-quantum channels,” Physical Review A, vol. 99, no. 5, p. 052329, May 2019.
  20. M. Tahmasbi and M. R. Bloch, “First and Second Order Asymptotics in Covert Communication,” IEEE Transactions on Information Theory, vol. 65, no. 4, pp. 2190–2212, Apr. 2019.
  21. R. A. Chou, M. R. Bloch, and J. Kliewer, “Empirical and Strong Coordination via Soft Covering with Polar Codes,” IEEE Transactions on Information Theory, vol. 64, no. 7, pp. 5087–5100, Jul. 2018.
  22. B. Larrousse, S. Lasaulce, and M. Bloch, “Coordination in distributed networks via coded actions with application to power control,” IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3633–3654, May 2018.
  23. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Strong Coordination Over Multi-Hop Line Networks Using Channel Resolvability Codebooks,” IEEE Transactions on Information Theory, vol. 64, no. 2, pp. 1132–1162, Feb. 2018.
  24. G. Frèche, M. Bloch, and M. Barret, “Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels,” Entropy, vol. 20, no. 1, p. 3, Dec. 2017.
  25. R. A. Chou, B. N. Vellambi, M. R. Bloch, and J. Kliewer, “Coding Schemes for Achieving Strong Secrecy at Negligible Cost,” IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1858–1873, Mar. 2017.
  26. M. R. Bloch, “Covert Communication over Noisy Channels: A Resolvability Perspective,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2334–2354, May 2016.
  27. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2410–2429, May 2016.
  28. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” IEEE Transactions on Information Theory, vol. 61, no. 11, pp. 6213–6237, Nov. 2015.
  29. M. R. Bloch, M. Hayashi, and A. Thangaraj, “Error-Control Coding for Physical-Layer Secrecy,” Proceedings of IEEE, vol. 103, no. 10, pp. 1725–1746, Oct. 2015.
  30. V. Y. F. Tan and M. R. Bloch, “Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1891–1904, Sep. 2015.
  31. R. A. Chou and M. R. Bloch, “Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation,” IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4941–4957, Aug. 2014.
  32. N. Li et al., “Two approaches for ultrafast random bit generation based on the chaotic dynamics of a semiconductor laser,” Optics Express, vol. 22, no. 6, pp. 6634–6646, Mar. 2014.
  33. M. R. Bloch and J. N. Laneman, “Strong Secrecy from Channel Resolvability,” IEEE Transactions on Information Theory, vol. 59, no. 12, pp. 8077–8098, Dec. 2013.
  34. W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, “Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 41–50, Sep. 2013.
  35. M. R. Bloch and J. N. Laneman, “Exploiting Partial Channel State Information for Secrecy over Wireless Channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1840–1849, Sep. 2013.
  36. R. Bassily et al., “Cooperative Security at the Physical Layer: A Summary of Recent Advances,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 16–28, Sep. 2013.
  37. F. Renna, M. R. Bloch, and N. Laurenti, “Semi-blind Key-Agreement over MIMO Fading Channels,” IEEE Transactions on Communications, vol. 61, no. 2, pp. 620–627, Feb. 2013.
  38. A. J. Pierrot and M. R. Bloch, “Strongly Secure Communications Over the Two-Way Wiretap Channel,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 595–605, Sep. 2011.
  39. A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 585–594, Sep. 2011.
  40. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Wireless Secrecy Regions with Friendly Jamming,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 256–266, Jun. 2011.
  41. T. F. Wong, M. Bloch, and J. M. Shea, “Secret Sharing over Fast-Fading MIMO Wiretap Channels,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 506973/1–17, 2009.
  42. M. Bloch, R. Narasimha, and S. W. McLaughlin, “Network Security for Client-Server Architecture using Wiretap Codes,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 404–413, Sep. 2008.
  43. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless Information-Theoretic Security,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515–2534, Jun. 2008.
  44. J. Lodewyck et al., “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Physical Review A, vol. 76, pp. 042305/1–10, Oct. 2007.
  45. M. Bloch, S. W. McLaughlin, F. Patois, and J.-M. Merolla, “Frequency-Coded Quantum Key Distribution,” Optics Letters, vol. 32, no. 3, pp. 301–303, Feb. 2007.
  46. S. Donnet, A. Thangaraj, M. Bloch, J. Cussey, J.-M. Merolla, and L. Larger, “Security of Y-00 under heterodyne measurement and fast correlation attack,” Physics Letters A, vol. 356, no. 6, pp. 406–410, Aug. 2006.

conference proceedings

  1. G. Canal, M. R. Bloch, and C. Rozell, “Feedback Coding for Active Learning,” in Proc. of The 24th International Conference on Artificial Intelligence and Statistics, Jan. 2021, vol. 130, pp. 1468–1476.
  2. S.-Y. Wang and M. R. Bloch, “Covert MIMO Communications under Variational Distance Constraint,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 828–833.
  3. N. Helal, M. Bloch, and A. Nosratinia, “Resolvability of the Multiple Access Channel with Two-Sided Cooperation,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020.
  4. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication in the Presence of Channel State Information,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 834–839.
  5. M. Tahmasbi and M. R. Bloch, “Active Covert Sensing,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 840–845.
  6. M.-C. Chang and M. Bloch, “Evasive Active Hypothesis Testing,” in Proc. of IEEE International Symposium on Information Theory, Los Angeles, CA, Jun. 2020, pp. 1248–1253.
  7. A. Benevento, M. Santos, G. Notarstefano, K. Paynabar, M. Bloch, and M. Egerstedt, “Multi-Robot Coordination for Estimation and Coverage of Unknown Spatial Fields,” in Proc. of IEEE International Conference on Robotics and Automation, Paris, France, May 2020, pp. 7740–7746.
  8. M. Tahmasbi and M. R. Bloch, “Covert Communication with Unknown Code at the Warden,” in Proc. of Allerton Conference on Communication, Control and Computing, Monticello, IL, Sep. 2019, pp. 1060–1067.
  9. N. Helal, M. R. Bloch, and A. Nostratinia, “Channel Resolvability with a Full-Duplex Decode-and-Forward Relay,” in Proc. of IEEE Information Theory Workshop, Visby, Sweden, Aug. 2019, pp. 1–5.
  10. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Forward Reconciliation for Covert Key Generation,” in Proc. of IEEE Information Theory Workshop, Visby, Sweden, Aug. 2019, pp. 1–5.
  11. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Keyless Covert Communication in the Presence of Non-causal Channel State Information,” in Proc. of IEEE Information Theory Workshop, Visby, Sweden, Aug. 2019, pp. 1–5.
  12. M. Tahmasbi and M. Bloch, “Steganography Protocols for Quantum Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 2179–2183.
  13. W. Harrison and M. R. Bloch, “Attributes of Generator Matrices for Best Finite Blocklength Wiretap Codes,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 827–831.
  14. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Codes for Covert Communication over Additive White Gaussian Noise Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 977–981.
  15. Q. Zhang, M. Bloch, M. Bakshi, and S. Jaggi, “Undetectable Radios: Covert Communication under Spectral Mask Constraints,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 992–996.
  16. M. Tahmasbi, M. Bloch, and A. Yener, “In-Band Sensing of the Adversary’s Channel for Secure Communication in Wireless Channels,” in Proc. of IEEE International Symposium on Information Theory, Paris, France, Jul. 2019, pp. 2184–2188.
  17. G. Cervia, L. Luzzi, M. Le Treust, and M. R. Bloch, “Strong coordination over noisy channels with strictly causal encoding,” in Proc. of 56th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2018, pp. 519–526.
  18. W. K. Harrison and M. R. Bloch, “On Dual Relationships of Secrecy Codes,” in Proc. of 56th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2018, pp. 366–372.
  19. N. Helal, M. R. Bloch, and A. Nosratinia, “Multiple-Access Channel Resolvability with Cribbing,” in Proc. of IEEE International Symposium on Information Theory, Vail, CO, Jun. 2018, pp. 2052–2056.
  20. K. S. K. Arumugam, M. R. Bloch, and L. Wang, “Covert Communication over a Physically Degraded Relay Channel with Non-Colluding Wardens,” in Proc. of IEEE International Symposium on Information Theory, Vail, CO, Jun. 2018, pp. 766–770.
  21. I. A. Kadampot, M. Tahmasbi, and M. R. Bloch, “Multilevel-Coded Pulse Position Modulation for Covert Communications,” in Proc. of IEEE International Symposium on Information Theory, Vail, CO, Jun. 2018, pp. 1864–1868.
  22. M. Tahmasbi, M. R. Bloch, and V. F. Tan, “Error exponents covert communications,” in Proc. of IEEE Information Theory Workshop, Kaohsiung, Taiwan, Nov. 2017, pp. 304–308.
  23. K. S. K. Arumugam and M. R. Bloch, “Covert communication over broadcast channels,” in Proc. of IEEE Information Theory Workshop, Kaohsiung, Taiwan, Nov. 2017, pp. 299–303.
  24. M. Tahmasbi and M. R. Bloch, “Covert secret key generation,” in Proc. of IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security, Las Vegas, NV, Oct. 2017, pp. 540–544.
  25. H. Zivari-Fard, M. Bloch, and A. Nosratinia, “Two-Transmitter Two-Receiver Channel with Confidential Messages,” in Proc. of Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2017.
  26. M. R. Bloch and S. Guha, “Optimal Covert Communications using Pulse-Position Modulation,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 2835–2839.
  27. E. Shipilova, J.-L. Boelle, M. Barret, M. Bloch, and J.-L. Collette, “Separation of impulsive blended seismic sources using Orthogonal Matching Pursuit,” in 79th Annual International Conference and Exhibition EAGE, Paris, France, Jun. 2017.
  28. M. Tahmasbi, M. R. Bloch, and A. Yener, “Learning Adversary’s Actions for Secret Communication,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 2713–2717.
  29. I. A. Kadampot and M. R. Bloch, “Coordination with Clustered Common Randomness in a Three-Terminal Line Network,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 1828–1832.
  30. G. Cervia, L. Luzzi, M. L. Treust, and M. R. Bloch, “Strong Coordination of Signals and Actions over Noisy Channels,” in Proc. of IEEE International Symposium on Information Theory, Aachen, Germany, Jun. 2017, pp. 2845–2849.
  31. K. S. K. Arumugam, I. A. Kadampot, M. Tahmasbi, S. Shah, M. Bloch, and S. Pokutta, “Modulation recognition using side information and hybrid learning,” in Proc. IEEE Int. Symp. Dynamic Spectrum Access Networks (DySPAN), Piscataway, NJ, Mar. 2017, pp. 1–2.
  32. G. Frèche, M. R. Bloch, and M. Barret, “Polar codes for covert communications over asynchronous Discrete Memoryless Channels,” in Proc. of 51st Annual Conference on Information Sciences and Systems, Baltimore, MD, Mar. 2017, pp. 1–1.
  33. K. S. K. Arumugam and M. R. Bloch, “Keyless asynchronous covert communication,” in Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, Sep. 2016, pp. 191–195.
  34. G. Cervia, L. Luzzi, M. R. Bloch, and M. L. Treust, “Polar coding for empirical coordination of signals and actions over noisy channels,” in Proc. of IEEE Information Theory Workshop, Cambridge, United Kingdom, Sep. 2016, pp. 81–85.
  35. M. Tahmasbi and M. R. Bloch, “Second Order Asymptotics for Degraded Wiretap Channels: How Good Are Existing Codes?,” in 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2016, pp. 830–837.
  36. R. A. Chou, M. R. Bloch, and A. Yener, “Universal covertness for Discrete Memoryless Sources,” in 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, Aug. 2016, pp. 516–523.
  37. K. S. K. Arumugam and M. R. Bloch, “Keyless Covert Communication over Multiple-Access Channels,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 2229–2233.
  38. M. Le Treust and M. R. Bloch, “Empirical Coordination, State Masking and State Amplification: Core of the Decoder’s Knowledge,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 895–899.
  39. M. Tahmasbi and M. R. Bloch, “Second-Order Asymptotics of Covert Communications over Noisy Channels,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 2224–2228.
  40. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Lossy Compression with Near-uniform Encoder Outputs,” in Proc. of IEEE International Symposium on Information Theory, Barcelona, Spain, Jul. 2016, pp. 530–534.
  41. B. N. Vellambi, J. Kliewer, and M. R. Bloch, “Strong coordination over a line when actions are Markovian,” in Proc. of Annual Conference on Information Science and Systems, Princeton, NJ, Mar. 2016, pp. 412–417.
  42. R. A. Chou and M. R. Bloch, “Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes,” in Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2015, pp. 1380–1385.
  43. B. N. Vellambi, J. Kliewer, and M. Bloch, “Strong Coordination over Multi-hop Line Networks,” in Proc. of IEEE Information Theory Workshop, Jeju, Korea, Jul. 2015, pp. 192–196.
  44. B. N. Vellambi, M. R. Bloch, R. A. Chou, and J. Kliewer, “Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 2171–2175.
  45. M. R. Bloch, “A Channel Resolvability Perspective on Stealth Communications,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 2535–2539.
  46. R. A. Chou, M. R. Bloch, and J. Kliewer, “Polar Coding for Empirical and Strong Coordination via Distribution Approximation,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 1512–1516.
  47. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages,” in Proc. of IEEE Information Theory Workshop, Jerusalem, Israel, Apr. 2015, pp. 1–5.
  48. M. R. Bloch and J. Kliewer, “Strong Coordination over a Three-Terminal Relay Network,” in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, Nov. 2014, pp. 646–650.
  49. R. A. Chou, M. R. Bloch, and J. Kliewer, “Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel,” in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, Nov. 2014, pp. 466–470.
  50. R. A. Chou and M. R. Bloch, “Uniform Distributed Source Coding for the Multiple Access Wiretap Channel,” in Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, Oct. 2014, pp. 127–132.
  51. V. Y. F. Tan and M. R. Bloch, “Information spectrum approach to strong converse theorems for degraded wiretap channels,” in Proc. of 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2014, pp. 747–754.
  52. N. Li et al., “Ultrafast Random Bit Generation Based on the Chaotic Dynamics of a Semiconductor Laser,” in Proc. of CLEO, San Jose, CA, Jun. 2014, pp. 1–2.
  53. J. J. Boutros, V. Dedeoglu, and M. R. Bloch, “The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel,” in Proc. of International Zurich Seminar on Communications, Zurich, Switzerland, Feb. 2014.
  54. R. A. Chou and M. R. Bloch, “Secret-Key Generation with Arbitrarily Varying Eavesdropper’s Channel,” in Proc. of Global Conference on Signal and Information Processing, Austin, TX, Sep. 2013, pp. 277–280.
  55. C. Ling, L. Luzzi, and M. R. Bloch, “Secret key generation from Gaussian sources using lattice hashing,” in Proc. of IEEE International Symposium on Information Theory, Istanbul, Turkey, Jul. 2013, pp. 2621–2625.
  56. M. R. Bloch and J. Kliewer, “Strong coordination over a line network,” in Proc. of IEEE International Symposium on Information Theory, Istanbul, Turkey, Jul. 2013, pp. 2319–2323.
  57. R. A. Chou and M. R. Bloch, “Data compression with nearly uniform ouput,” in Proc. of IEEE International Symposium on Information Theory, Istanbul, Turkey, Jul. 2013, pp. 1979–1983.
  58. F. Renna et al., “Low-power secret key agreement over OFDM,” in Proc. of the 2nd ACM workshop on Hot topics on wireless network security and privacy, Budapest, Hungary, Apr. 2013, pp. 43–48.
  59. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” in Proc. of IEEE Information Theory Workshop, Sevilla, Spain, Apr. 2013, pp. 1–5.
  60. A. J. Pierrot and M. R. Bloch, “Joint Channel Intrinsic Randomness and Channel Resolvability,” in Proc. of IEEE Information Theory Workshop, Sevilla, Spain, Apr. 2013, pp. 1–5.
  61. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments,” in Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, Apr. 2013.
  62. M. R. Bloch, L. Luzzi, and J. Kliewer, “Strong Coordination with Polar Codes,” in Proc. of 50th Allerton Conference on Communication, Control, and Computing, Monticello, IL, Oct. 2012, pp. 565–571.
  63. A. J. Pierrot and M. R. Bloch, “LDPC-based coded cooperative jamming codes,” in Proc. of IEEE Information Theory Workshop, Lausanne, Switzerland, Sep. 2012, pp. 462–466.
  64. M. R. Bloch and J. Kliewer, “On secure communication with constrained randomization,” in Proc. of IEEE International Symposium on Information Theory, Cambridge, MA, Jul. 2012, pp. 1172–1176.
  65. R. A. Chou and M. R. Bloch, “One-way rate-limited sequential key-distillation,” in Proc. of IEEE International Symposium on Information Theory, Cambridge, MA, Jul. 2012, pp. 1777–1781.
  66. M. R. Bloch, “Achieving Secrecy: capacity vs. Resolvability,” in Proc. of IEEE International Symposium on Information Theory, Saint Petersburg, Russia, Aug. 2011, pp. 632–636.
  67. F. Renna, M. Bloch, and N. Laurenti, “Semi-Blind Key-Agreement over MIMO Fading Channels,” in Proc. of IEEE International Conference on Communications, Kyoto, Japan, Jun. 2011, pp. 1–6.
  68. L. Luzzi and M. R. Bloch, “Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels,” in Proc. of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, Cachan, France, May 2011, pp. 641–647.
  69. F. Renna, M. Bloch, and N. Laurenti, “Semi-Blind Key-Agreement over MIMO Quasi-Static Channels,” in Proc. of 2011 NEWCOM/COST Joint Workshop, Paris, France, Mar. 2011, pp. 1–6.
  70. A. Subramanian, A. T. Suresh, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong and Weak Secrecy in Wiretap Channels,” in Proc. of 6th International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, Sep. 2010, pp. 30–34.
  71. A. T. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong Secrecy for Erasure Wiretap Channels,” in Proc. of IEEE Information Theory Workshop, Dublin, Ireland, Sep. 2010.
  72. M. Bloch, “Channel Intrinsic Randomness,” in Proc. of IEEE International Symposium on Information Theory, Austin, TX, Jun. 2010, pp. 2607–2611.
  73. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Friendly Jamming for Wireless Secrecy,” in Proc. of IEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1550–3607.
  74. M. Rodrigues, A. Somekh-Baruch, and M. Bloch, “On Gaussian Wiretap Channels with Arbitrary Inputs,” in Proc. of European Wireless, Lucca, Italy, Apr. 2010, pp. 774–781.
  75. E. MolavianJazi, M. Bloch, and J. N. Laneman, “Arbitrary Jamming Can Preclude Secure Communications,” in Proc. 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2009, pp. 1069–1075.
  76. M. Bloch, “Channel Scrambling for Secrecy,” in Proc. of IEEE International Symposium on Information Theory, Seoul, Korea, Jul. 2009, pp. 2452–2456.
  77. B. P. Dunn, M. Bloch, and J. N. Laneman, “Secure bits through queues,” in Proc. of IEEE Information Theory Workshop, Volos, Greece, Jun. 2009, pp. 37–41.
  78. M. Bloch and J. N. Laneman, “Information-Spectrum Methods for Information-Theoretic Security,” in Proc. Information Theory and Applications Workshop, San Diego, CA, Feb. 2009, pp. 23–28.
  79. M. Bloch and J. N. Laneman, “On the Secrecy Capacity of Arbitrary Wiretap Channels,” in Proceedings of 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2008, pp. 818–825.
  80. J. Barros and M. Bloch, “Strong Secrecy for Wireless Channels,” in Information Theoretic Security, Calgary, Canada, Aug. 2008, pp. 40–53.
  81. M. Bloch and A. Thangaraj, “Confidential Messages to a Cooperative Relay,” in Proc. of IEEE Information Theory Workshop, Porto, Portugal, May 2008, pp. 154–158.
  82. S. Fossier et al., “Quantum Key Distribution over 25 km Using a Fiber Setup Based on Continuous Variables,” in Proc. of CLEO/QELS, San Jose, CA, May 2008, pp. 1–2.
  83. M. Bloch, R. Narasimha, and S. W. McLaughlin, “Client-Server Architecture Design based on Wiretap Codes,” in Proc of the 2008 International Zurich Seminar on Communications, Zurich, Switzerland, Mar. 2008, pp. 44–47.
  84. E. Diamanti et al., “Implementation of an all-fiber continuous variables quantum key distribution system,” in International Conference on Quantum Information Processing and Communication, Barcelona, Spain, Oct. 2007.
  85. M. Bloch, J. Barros, and S. W. McLaughlin, “Practical Information-Theoretic Commitment,” in Proc. 45th Allerton Conference on Communication Control and Computing, Monticello, IL, Sep. 2007, pp. 1035–1039.
  86. J. Lodewyck et al., “Quantum key distribution device with coherent states,” in Proc. of SPIE Optics East, Boston, MA, USA, Sep. 2007, vol. 6780, pp. 67800Z/1–14.
  87. J. Lodewyck et al., “Distribution quantique de clé a 25 km au moyen d’un dispositif fibré utilisant des variables continues,” in 10eme Colloque sur les Lasers et l’Optique Quantique, Grenoble, France, Jul. 2007.
  88. S. Kaimalettu, A. Thangaraj, M. Bloch, and S. W. McLaughlin, “Constellation Shaping using LDPC Codes,” in Proc. of IEEE International Symposium on Information Theory, Nice, France, Jun. 2007, pp. 2366–2370.
  89. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Information Theoretic Security for Wireless Channels - Theory and Practice,” in Proc. 2007 Information Theory and Application Workshop, San Diego, CA, USA, Feb. 2007.
  90. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “LDPC-based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper’s Channels,” in Proc. of IEEE Information Theory Workshop, Chengdu, China, Oct. 2006, pp. 155–159.
  91. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “An Opportunistic Physical-Layer Approach to Secure Wireless Communications,” in Proc. 44th Allerton Conference on Communication Control and Computing, Monticello, IL, Sep. 2006, pp. 849–854.
  92. S. Donnet, A. Thangaraj, M. Bloch, J. Cussey, J.-M. Merolla, and L. Larger, “Cryptanalysis of Y-00 under Heterodyne Measurement and Fast Correlation Attack,” in Proc. European Conference on Optical Communication, Cannes, France, Sep. 2006, pp. 1–2.
  93. M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, “LDPC-based Secret Key Agreement over the Gaussian wiretap channel,” in Proc. of IEEE International Symposium on Information Theory, Seattle, USA, Jul. 2006, pp. 1179–1183.
  94. M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, “LDPC-based Gaussian Key Reconciliation,” in Proc. of IEEE Information Theory Workshop, Punta del Este, Uruguay, Mar. 2006, pp. 116–120.
  95. J. Cussey, M. Bloch, A. Thangaraj, J.-M. Merolla, and S. W. McLaughlin, “Integrated Direct-Modulation Based Quantum Cryptography System,” in Proc. Optical Network and Technologies, Pisa, Italy, Oct. 2004, pp. 390–395.
  96. J. Cussey, M. Bloch, A. Thangaraj, J.-M. Merolla, and S. W. McLaughlin, “Direct-Modulation Scheme for Free-Space Quantum Cryptography,” in Proc. European Conference on Optical Communication, Stockholm, Sweden, Sep. 2004.