{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:05:14Z","timestamp":1725584714385},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642209000"},{"type":"electronic","value":"9783642209017"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20901-7_3","type":"book-chapter","created":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T10:11:30Z","timestamp":1307182290000},"page":"47-61","source":"Crossref","is-referenced-by-count":2,"title":["Lattice Codes for the Gaussian Wiretap Channel"],"prefix":"10.1007","author":[{"given":"Jean-Claude","family":"Belfiore","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9rique","family":"Oggier","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Sol\u00e9","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"3_CR1","first-page":"2135","volume":"63","author":"L.H. Ozarow","year":"1984","unstructured":"Ozarow, L.H., Wyner, A.D.: Wire-tap channel II. Bell Syst. Tech. Journal\u00a063(10), 2135\u20132157 (1984)","journal-title":"Bell Syst. Tech. Journal"},{"doi-asserted-by":"crossref","unstructured":"Zamir, R., Shamai, S., Erez, U.: Linear\/lattice codes for structured multi-terminal binning. IEEE Trans. Inf. Theory (June 2002)","key":"3_CR2","DOI":"10.1109\/TIT.2002.1003821"},{"doi-asserted-by":"crossref","unstructured":"Pradhan, S., Ramchandran, K.: Generalized coset codes for distributed binning. IEEE Trans. Inf. Theory (October 2005)","key":"3_CR3","DOI":"10.1109\/TIT.2005.855584"},{"doi-asserted-by":"crossref","unstructured":"Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S., Merolla, J.-M.: Applications of LDPC codes to the wiretap channel. IEEE Trans. Inf. Theory\u00a053(8) (August 2007)","key":"3_CR4","DOI":"10.1109\/TIT.2007.901143"},{"doi-asserted-by":"crossref","unstructured":"Klinc, D., Ha, J., McLaughlin, S., Barros, J., Kwak, B.: LDPC codes for the Gaussian wiretap channel. In: Proc. Information Theory Workshop (October 2009)","key":"3_CR5","DOI":"10.1109\/ITW.2009.5351456"},{"doi-asserted-by":"crossref","unstructured":"El Rouayheb, S.Y., Soljanin, E.: On wiretap networks II. In: Proceedings ISIT (2007)","key":"3_CR6","DOI":"10.1109\/ISIT.2007.4557098"},{"unstructured":"He, X., Yener, A.: Providing secrecy with structured codes: Tools and applications to two-user Gaussian channels (July 2009), http:\/\/arxiv.org\/pdf\/0907.5388","key":"3_CR7"},{"doi-asserted-by":"crossref","unstructured":"Belfiore, J.-C., Oggier, F.: Secrecy gain: a wiretap lattice code design. In: ISITA 2010 (2010), arXiv:1004.4075v1 [cs.IT]","key":"3_CR8","DOI":"10.1109\/ISITA.2010.5650095"},{"doi-asserted-by":"crossref","unstructured":"Wyner, A.: The wire-tap channel. Bell. Syst. Tech. Journal\u00a054 (October 1975)","key":"3_CR9","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"3_CR10","volume-title":"Sphere packings, Lattices and Groups","author":"J. Conway","year":"1998","unstructured":"Conway, J., Sloane, N.: Sphere packings, Lattices and Groups, 3rd edn. Springer, Heidelberg (1998)","edition":"3"},{"unstructured":"Weisstein, E.: Jacobi Theta Functions. MathWorld \u2013 A Wolfram Web Resource, http:\/\/mathworld.wolfram.com\/JacobiThetaFunctions.html","key":"3_CR11"},{"unstructured":"Skoruppa, N.-P.: Reduction mod \u2113 of Theta Series of level \u2113 n , arXiv:0807.4694v2[math.NT]","key":"3_CR12"},{"doi-asserted-by":"crossref","unstructured":"Ebeling, W.: Lattices and Codes. Advanced Lectures in Mathematics (1994)","key":"3_CR13","DOI":"10.1007\/978-3-322-96879-1"},{"unstructured":"Serre, J.-P.: A course in arithmetic. Graduate Texts in Mathematics (1996)","key":"3_CR14"},{"unstructured":"Oggier, F., Sol\u00e9, P., Belfiore, J.-C.: Lattice codes for the wiretap gaussian channel: Construction and analysis. IEEE Trans. Inf. Theory (2011) (submitted, on line on ArXiv)","key":"3_CR15"},{"doi-asserted-by":"crossref","unstructured":"Stein, W.: Modular Forms, a Computational Approach. Graduate Studies in Mathematics, vol.\u00a079. AMS (2007)","key":"3_CR16","DOI":"10.1090\/gsm\/079"},{"unstructured":"Cassels, J.: Rational Quadratic Forms. Dover Books on Mathematics. Dover, New york (1978)","key":"3_CR17"}],"container-title":["Lecture Notes in Computer Science","Coding and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20901-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T08:07:30Z","timestamp":1560240450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20901-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642209000","9783642209017"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20901-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}