Laura Luzzi
YOU?
Author Swipe
View article: Covert Capacity of AWGN Channels under Average Error Probability
Covert Capacity of AWGN Channels under Average Error Probability Open
We derive upper and lower bounds for the covert capacity of Additive White Gaussian Noise channels when measuring reliability in terms of the average error probability and covertness in terms of Kullback-Leibler divergence. This characteri…
View article: Covert Communication Over Additive-Noise Channels
Covert Communication Over Additive-Noise Channels Open
version to appear in IEEE Transactions on Information Theory
View article: Covert Communication Over Additive-Noise Channels
Covert Communication Over Additive-Noise Channels Open
We study the fundamental limits of covert communications over general memoryless additive-noise channels. We assume that the legitimate receiver and the eavesdropper share the same channel and therefore see the same outputs. Under mild int…
View article: Review of NORM occurrence and application of a tailored graded approach for the radiation protection in geothermal plants
Review of NORM occurrence and application of a tailored graded approach for the radiation protection in geothermal plants Open
In the present paper, the general methodological approach developed to manage legislative requirements for NORM involving industries was fitted to the geothermal industrial sector, which is in the indicative list of the European Directive …
View article: Optimal Rate-Limited Secret Key Generation From Gaussian Sources Using Lattices
Optimal Rate-Limited Secret Key Generation From Gaussian Sources Using Lattices Open
International audience
View article: Radiological Protection in Industries Involving NORM: A (Graded) Methodological Approach to Characterize the Exposure Situations
Radiological Protection in Industries Involving NORM: A (Graded) Methodological Approach to Characterize the Exposure Situations Open
The interest in radiation protection in industrial sectors involving Naturally Occurring Radioactive Materials (NORM) is increasingly growing. This is due also to the recent implementation of the European Council Directive 59/2013/Euratom …
View article: Covert Communication over Two Types of Additive Noise Channels
Covert Communication over Two Types of Additive Noise Channels Open
We extend previous results on covert communication over the additive white Gaussian noise channel to two other types of additive noise channels. The first is the Gaussian channel with memory, where the noise sequence is a Gaussian vector w…
View article: Optimal rate-limited secret key generation from Gaussian sources using lattices
Optimal rate-limited secret key generation from Gaussian sources using lattices Open
We propose a lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that it achieves the strong secret key capacity in the case of degraded source models, as well as the optimal se…
View article: The DMT of Real and Quaternionic Lattice Codes and DMT Classification of Division Algebra Codes
The DMT of Real and Quaternionic Lattice Codes and DMT Classification of Division Algebra Codes Open
International audience
View article: Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels Open
In this paper, we consider a semi-deterministic wiretap channel where the\nmain channel is noiseless and the eavesdropper's channel is a binary erasure\nchannel (BEC). We provide a lower bound for the achievable secrecy rates of\npolar and…
View article: Error Correction for FrodoKEM Using the Gosset Lattice
Error Correction for FrodoKEM Using the Gosset Lattice Open
We consider FrodoKEM, a lattice-based cryptosystem based on LWE, and propose a new error correction mechanism to improve its performance. Our encoder maps the secret key block-wise into the Gosset lattice $E_8$. We propose two sets of para…
View article: Reduced Complexity of a Successive Cancellation Based Decoder for NB-Polar Codes
Reduced Complexity of a Successive Cancellation Based Decoder for NB-Polar Codes Open
International audience
View article: Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels Open
In this paper, we consider a semi-deterministic wiretap channel where the main channel is noiseless and the eavesdropper's channel is a binary erasure channel (BEC). We provide a lower bound for the achievable secrecy rates of polar and Re…
View article: The DMT of Real and Quaternionic Lattice Codes and DMT Classification of Division Algebra Codes
The DMT of Real and Quaternionic Lattice Codes and DMT Classification of Division Algebra Codes Open
In this paper we consider the diversity-multiplexing gain tradeoff (DMT) of so-called minimum delay asymmetric space-time codes. Such codes are less than full dimensional lattices in their natural ambient space. Apart from the multiple inp…
View article: Strong Coordination of Signals and Actions Over Noisy Channels With Two-Sided State Information
Strong Coordination of Signals and Actions Over Noisy Channels With Two-Sided State Information Open
We consider a network of two nodes separated by a noisy channel with\ntwo-sided state information, in which the input and output signals have to be\ncoordinated with the source and its reconstruction. In the case of non-causal\nencoding an…
View article: A reconciliation approach to key generation based on Module-LWE
A reconciliation approach to key generation based on Module-LWE Open
We consider a key encapsulation mechanism (KEM) based on Module-LWE where\nreconciliation is performed on the 8-dimensional lattice $E_8$, which admits a\nfast CVP algorithm. Our scheme generates 256 bits of key and requires 3 or 4\nbits o…
View article: A reconciliation approach to key generation based on Module-LWE
A reconciliation approach to key generation based on Module-LWE Open
We consider a key encapsulation mechanism (KEM) based on Module-LWE where reconciliation is performed on the 8-dimensional lattice $E_8$, which admits a fast CVP algorithm. Our scheme generates 256 bits of key and requires 3 or 4 bits of r…
View article: Strong Coordination over Noisy Channels with Strictly Causal Encoding
Strong Coordination over Noisy Channels with Strictly Causal Encoding Open
We consider a network of two nodes separated by a noisy channel, in which the\ninput and output signals have to be coordinated with the source and its\nreconstruction. In the case of strictly causal encoding and non-causal\ndecoding, we pr…
View article: Strong Coordination over Noisy Channels with Strictly Causal Encoding
Strong Coordination over Noisy Channels with Strictly Causal Encoding Open
We consider a network of two nodes separated by a noisy channel, in which the input and output signals have to be coordinated with the source and its reconstruction. In the case of strictly causal encoding and non-causal decoding, we prove…
View article: The DMT classification of real and quaternionic lattice codes
The DMT classification of real and quaternionic lattice codes Open
5 pages, 1 figure
View article: Polar codes for empirical coordination over noisy channels with strictly causal encoding
Polar codes for empirical coordination over noisy channels with strictly causal encoding Open
In this paper, we propose a coding scheme based on polar codes for empirical coordination of autonomous devices. We consider a two-node network with a noisy link in which the input and output signals have to be coordinated with the source …
View article: The DMT classification of real and quaternionic lattice codes
The DMT classification of real and quaternionic lattice codes Open
In this paper we consider space-time codes where the code-words are restricted to either real or quaternion matrices. We prove two separate diversity-multiplexing gain trade-off (DMT) upper bounds for such codes and provide a criterion for…
View article: Algebraic lattice codes for linear fading channels
Algebraic lattice codes for linear fading channels Open
In the decades following Shannon's work, the quest to design codes for the additive white Gaussian noise (AWGN) channel led to the development of a rich theory, revealing a number of beautiful connections between information theory and geo…
View article: Strong Coordination of Signals and Actions over Noisy Channels
Strong Coordination of Signals and Actions over Noisy Channels Open
-We develop a random binning scheme for strong coordination in a network of\ntwo nodes separated by a noisy channel, in which the input and output signals\nhave to be coordinated with the source and its reconstruction. In the case of\nnon-…
View article: Strong Coordination of Signals and Actions over Noisy Channels
Strong Coordination of Signals and Actions over Noisy Channels Open
-We develop a random binning scheme for strong coordination in a network of two nodes separated by a noisy channel, in which the input and output signals have to be coordinated with the source and its reconstruction. In the case of non-cau…
View article: Almost universal codes achieving ergodic MIMO capacity within a constant gap
Almost universal codes achieving ergodic MIMO capacity within a constant gap Open
International audience
View article: Almost universal codes for MIMO wiretap channels
Almost universal codes for MIMO wiretap channels Open
Despite several works on secrecy coding for fading and MIMO wiretap channels from an error probability perspective, the construction of information-theoretically secure codes over such channels remains an open problem. In this paper, we co…
View article: Polar coding for empirical coordination of signals and actions over noisy channels
Polar coding for empirical coordination of signals and actions over noisy channels Open
-We develop a polar coding scheme for empirical coordination in a two-node network with a noisy link in which the input and output signals have to be coordinated with the source and the reconstruction. In the case of non-causal encoding an…