JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (7): 60-64.doi: 10.6040/j.issn.1671-9352.2.2017.025
Previous Articles Next Articles
LIU Zheng1, NIU Fang-lin1*, QIAN Da-xing2, CAI Xi-biao1, GUO Ying3
CLC Number:
[1] OKAMOTO T,YAMAMOTO H. Modern cryptography[M]. Tokyo: Sangyo-Tosho, 1997: 1-12. [2] KASAHARA M, SAKAI R. A construction of short public-key cryptosystem over extension field[J]. Technical report of IEICE. ISEC, 2003, 102:63-68. [3] MCELIECE R J. A public-key cryptosystem based on algebraic coding theory[J]. Deep Space Network Progress Report, 1978, 44:114-116. [4] XU H, FENG D, SUN C, et al. Construction of LDPC codes based on resolvable group divisible designs[C] // International Workshop on High Mobility Wireless Communications. IEEE, 2015: 111-115. [5] KLINC D, HA J, MCLAUGHLIN S W, et al. LDPC codes for the Gaussian wiretap channel[C] // Information Theory Workshop, 2009. Itw. IEEE, 2009: 95-99. [6] YUKSEL M, ERKIP E. The relay channel with a wire-tapper[C] // Information Sciences and Systems, 2007. CISS'07. Conference on. IEEE, 2007: 13-18. [7] TEKIN E, YENER A. The general gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming[J]. IEEE Transactions on Information Theory, 2007, 54(6):2735-2751. [8] LAI L, GAMAL H E, POOR H V. The wiretap channel with feedback: encryption over the channel[J]. IEEE Transactions on Information Theory, 2008, 54(11):5059-5067. [9] LIN P H, LAI S H, LIN S C, et al. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels[J]. IEEE Journal on Selected Areas in Communications, 2012, 31(9):1728-1740. [10] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6):2180-2189. [11] BYERS J W, LUBY M, MITZENMACHER M, et al. A digital fountain approach to reliable distribution of bulk data[J]. Acm Sigcomm Computer Communication Review, 1998, 28(4):56-67. [12] GUREVICH Y. Proceedings 43rd annual IEEE symposium on foundations of computer science[J]. Zeitschrift Für Geburtshilfe Und Neonatologie, 2002, 8(5):201-210. [13] SUH Y, BAIK J, Rahnavard N, et al. Fountain code design for broadcasting systems with intermediate-state users[J]. IEEE Transactions on Communications, 2015, 63(9):3057-3068. [14] BORUJENY R R, ARDAKANI M. Fountain code design for the Y-network[J]. IEEE Communications Letters, 2015, 19(5):703-706. [15] 牛芳琳, 李宝明, 陈付亮,等. 一种改进的基于部分信息喷泉码度分布设计[J]. 电子学报, 2016, 44(2):295-300. NIU Fanglin, LI Baoming, CHEN Fuliang, et al. The improved degree distribution for rateless code under partial inform-ation[J]. Acta Electronica Sinica, 2016, 44(2):295-300. [16] 雷维嘉, 张梦, 谢显中. 基于度分布合并和可译集优化的LT码度分布设计方案[J]. 电子学报, 2015, 43(4):800-805. LEI Weijia, ZHANG Meng, XIE Xianzhong. A design scheme for LT codes degree distribution by combining degree distributions and optimizing ripple size[J]. Acta Electronica Sinica, 2015, 43(4):800-805. |
No related articles found! |
|