Shannon-Theoretic Secrecy

  1. N. Merhav and E. Arikan, ``The Shannon cipher system with a guessing wiretapper,'' IEEE Trans. Inform. Theory, vol. 45, no. 6, pp. 1860-1866, September 1999.
  2. N. Merhav, ``A large-deviations notion of perfect secrecy,'' IEEE Trans. Inform. Theory, vol. 49, no. 2, pp. 506-508, February 2003.
  3. N. Merhav, ``On joint coding for watermarking and encryption,'' IEEE Trans. Inform. Theory, vol. 52, no. 1, pp. 190-205, January 2006.
  4. N. Merhav, ``On the Shannon cipher system with a capacity-limited key-distribution channel,'' IEEE Trans. Inform. Theory, vol. 52, no. 3, pp. 1269-1273, March 2006.
  5. N. Merhav and S. Shamai (Shitz), ``Information rates subjected to state masking,'' IEEE Trans. Inform. Theory, vol. 53, no. 6, pp. 2254-2261, June 2007.
  6. N. Merhav, ``Shannon's secrecy system with informed receivers an its application to systematic coding for wiretapped channels,'' IEEE Trans. Inform. Theory, special issue on Information-Theoretic Security, vol. 54, no. 6, pp. 2723-2734, June 2008.
  7. N. Merhav, ``Perfectly secure encryption of individual sequences,'' IEEE Trans. Inform. Theory, vol. 58, no. 3, pp. 1302-1310, March 2013.
  8. Y. Kaspi and N. Merhav, ``On real-time and causal secure source coding,'' Proc. ISIT 2012, pp. 358-362, Cambridge, MA, USA, July 2012. Full version (with a slightly different title) appears here.
  9. N. Merhav, ``Exact correct-decoding exponent for the wiretap channel decoder, IEEE Trans. Inform. Theory. vol. 60, no. 12 pp. 7606-7615, December 2014.
  10. N. Weinberger and N. Merhav, ``A large deviations approach to secure lossy compression,'' IEEE Trans. Inform. Theory. vol. 63, no. 4, pp. 2533-2559, April 2017.
  11. M. Bastani Parizi, E. Telatar and N. Merhav, ``Exact random coding secrecy exponents for the wiretap channel, IEEE Trans. Inform. Theory. vol. 63, no. 1, pp. 509-531, January 2017.
  12. N. Merhav, ``Ensemble performance of biometric authentication systems based on secret key generation,'' IEEE Trans. Inform. Theory, vol. 65, no. 4, pp. 2477-2491, April 2019.
  13. N. Merhav and A. Cohen, ``Universal randomized guessing with application to asynchronous decentralized brute-force attacks,'' IEEE Trans. Inform. Theory, vol. 66, no. 1, pp. 114-129, January 2020.