BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//GREYC UMR CNRS 6072 - Groupe de Recherche en Informatique, Image, et Instrumentation de Caen - ECPv5.7.0//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:GREYC UMR CNRS 6072 - Groupe de Recherche en Informatique, Image, et Instrumentation de Caen
X-ORIGINAL-URL:https://www.greyc.fr
X-WR-CALDESC:évènements pour GREYC UMR CNRS 6072 - Groupe de Recherche en Informatique, Image, et Instrumentation de Caen
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20250305T140000
DTEND;TZID=Europe/Paris:20250305T150000
DTSTAMP:20260421T140316
CREATED:20250224T143502Z
LAST-MODIFIED:20250224T143502Z
UID:11804-1741183200-1741186800@www.greyc.fr
SUMMARY:Laura Luzzi - Finite blocklength secrecy analysis of polar and Reed-Muller codes in binary erasure wiretap channels
DESCRIPTION:Physical layer security aims to exploit the randomness of noisy channels in order to enhance security through coding and signal processing techniques. Unlike cryptography\, it does not place any limitations on the adversary’s computational power\, but relies on an asymmetry in the channel quality between the legitimate users and the adversary. In this talk\, we focus on the wiretap channel model\, where a legitimate transmitter and receiver communicate in the presence of an eavesdropper who observes a degraded version of the receiver’s outputs. For this model\, secrecy can be measured in terms of mutual information leakage\, or alternatively in terms of the average variational distance between output distributions corresponding to different confidential messages. \nMotivated by IoT applications that require short packets or low latency\, we focus on the performance of wiretap codes in finite blocklength. We consider a simple channel model where the main channel is noiseless and the eavesdropper’s channel is a binary erasure channel\, and provide lower bounds for the achievable secrecy rates of polar and Reed-Muller codes. We show that under a total variation secrecy metric\, Reed-Muller codes can achieve secrecy rates very close to the optimal second order coding rates.
URL:https://www.greyc.fr/event/laura-luzzi-finite-blocklength-secrecy-analysis-of-polar-and-reed-muller-codes-in-binary-erasure-wiretap-channels/
LOCATION:Sciences 3- S3 351
CATEGORIES:General,News,Safe,Séminaire Cryptologie et sécurité
END:VEVENT
END:VCALENDAR