{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T23:15:01Z","timestamp":1772147701267,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,6,29]],"date-time":"2015-06-29T00:00:00Z","timestamp":1435536000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s00200-015-0267-2","type":"journal-article","created":{"date-parts":[[2015,6,28]],"date-time":"2015-06-28T09:51:02Z","timestamp":1435485062000},"page":"571-590","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["2- and 3-Modular lattice wiretap codes in small dimensions"],"prefix":"10.1007","volume":"26","author":[{"given":"Fuchun","family":"Lin","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9rique","family":"Oggier","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Sol\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,29]]},"reference":[{"issue":"6","key":"267_CR1","doi-asserted-by":"crossref","first-page":"3295","DOI":"10.1109\/TIT.2013.2246814","volume":"59","author":"F Lin","year":"2013","unstructured":"Lin, F., Oggier, F.: A classification of unimodular lattice wiretap codes in small dimensions. IEEE Trans. Inf. Theory 59(6), 3295\u20133303 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"267_CR2","doi-asserted-by":"crossref","unstructured":"Wyner, A.D.: The wire-tap channel. Bell. Syst. Tech. J. 54(8), 1355\u20131387 (1975)","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"267_CR3","doi-asserted-by":"crossref","unstructured":"Liang, Y., Poor, H.V., Shamai, S.: Information theoretic security. Found Trends Commun Inform Theory 5(4\u20135), 355\u2013580 (2009). doi: 10.1561\/0100000036","DOI":"10.1561\/0100000036"},{"issue":"10","key":"267_CR4","first-page":"2135","volume":"63","author":"LH Ozarow","year":"1984","unstructured":"Ozarow, L.H., Wyner, A.D.: Wire-tap channel II. Bell Syst. Tech. J. 63(10), 2135\u20132157 (1984)","journal-title":"Bell Syst. Tech. J."},{"issue":"8","key":"267_CR5","doi-asserted-by":"crossref","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","volume":"53","author":"A Thangaraj","year":"2007","unstructured":"Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W., Merolla, J.-M.: Applications of LDPC codes to the wiretap channel. IEEE Trans. Inf. Theory 53(8), 2933\u20132945 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"267_CR6","doi-asserted-by":"crossref","first-page":"6428","DOI":"10.1109\/TIT.2011.2162275","volume":"57","author":"Hessam Mahdavifar","year":"2011","unstructured":"Mahdavifar, Hessam, Vardy, Alexander: Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Trans. Inf. Theory 57(10), 6428\u20136443 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"267_CR7","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s10623-014-9935-7","volume":"73","author":"SS Ong","year":"2014","unstructured":"Ong, S.S., Oggier, F.: Wiretap lattice codes from number fields with no small norm elements. Des. Codes Cryptogr. 73(2), 425\u2013440 (2014)","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"267_CR8","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/TIT.2011.2170660","volume":"58","author":"M Cheraghchi","year":"2012","unstructured":"Cheraghchi, M., Didier, F., Shokrollahi, A.: Invertible extractors and wiretap protocols. IEEE Trans. Inf. Theory 58(2), 1254\u20131274 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"267_CR9","doi-asserted-by":"crossref","unstructured":"Bellare, M., Tessaro, S., Vardy, A.: Semantic security for the wiretap channel. Adv. Cryptol. CRYPTO, 7417, 294\u2013311 (2012)","DOI":"10.1007\/978-3-642-32009-5_18"},{"issue":"4","key":"267_CR10","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"IT\u201324","author":"SK Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong, S.K., Hellman, M.E.: The Gaussian wire-tap channel. IEEE Trans. Inf. Theory IT\u201324(4), 451\u2013456 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"267_CR11","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","volume":"6","author":"D Klinc","year":"2011","unstructured":"Klinc, D., Ha, J., McLaughlin, S., Barros, J., Kwak, B.: LDPC codes for the Gaussian wiretap channel. IEEE Trans. Inf. Foren. Secur. 6(3), 532\u2013540 (2011)","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"key":"267_CR12","doi-asserted-by":"crossref","unstructured":"Liu, R., Poor, H.V., Spasojevic, P., Liang, Y.: Nested codes for secure transmission. In: Proceedings of PIMRC, pp. 1\u20135 (2008)","DOI":"10.1109\/PIMRC.2008.4699910"},{"key":"267_CR13","unstructured":"Belfiore, J.-C., Oggier, F.: Secrecy gain: a wiretap lattice code design. In: ISITA (2010). arXiv:1004.4075v2 [cs.IT]"},{"issue":"10","key":"267_CR14","doi-asserted-by":"crossref","first-page":"6399","DOI":"10.1109\/TIT.2014.2343226","volume":"60","author":"C Ling","year":"2014","unstructured":"Ling, C., Luzzi, L., Belfiore, J.-C., Stehle, D.: Semantically secure lattice codes for the gaussian wiretap channel. IEEE Trans. Inf. Forens. Secur. 60(10), 6399\u20136416 (2014)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"267_CR15","doi-asserted-by":"crossref","unstructured":"Belfiore, J.-C., Sol\u00e9, P.: Unimodular lattices for the Gaussian Wiretap Channel. In: ITW 2010, Dublin. arXiv:1007.0449v1 [cs.IT]","DOI":"10.1109\/CIG.2010.5592923"},{"key":"267_CR16","unstructured":"Oggier, F., Belfiore, J.-C., Sol\u00e9, P.: Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis. arXiv:1103.4086v3 [cs.IT]"},{"issue":"9","key":"267_CR17","doi-asserted-by":"crossref","first-page":"5950","DOI":"10.1109\/TIT.2012.2201915","volume":"58","author":"A-M Ernvall-Hyt\u00f6nen","year":"2012","unstructured":"Ernvall-Hyt\u00f6nen, A.-M.: On a conjecture by Belfiore and Sol\u00e9 on some lattices. IEEE Trans. Inf. Theory 58(9), 5950\u20135955 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"267_CR18","doi-asserted-by":"crossref","unstructured":"Ernvall-Hyt\u00f6nen, A.-M.: Some results related to the conjecture by Belfiore and Sol\u00e9. IEEE Trans. Inf. Theory 60(5), 2805\u20132812 (2014)","DOI":"10.1109\/TIT.2014.2311075"},{"key":"267_CR19","doi-asserted-by":"crossref","unstructured":"Lin, F., Oggier, F.: Gaussian wiretap lattice codes from binary self-dual codes. In: 2012 IEEE Information Theory Workshop (ITW) pp. 662\u2013666","DOI":"10.1109\/ITW.2012.6404761"},{"key":"267_CR20","doi-asserted-by":"crossref","unstructured":"Pinchak, J.: Wiretap codes: families of lattices satisfying the Belfiore\u2013Sol\u00e9 secrecy function conjecture. In: 2013 IEEE International Symposium on Information Theory (ISIT) pp. 2617\u20132620","DOI":"10.1109\/ISIT.2013.6620700"},{"key":"267_CR21","doi-asserted-by":"crossref","unstructured":"Pinchak, J., Sethuraman, B.A.: The belfiore-Sol\u00e9 conjecture and a certain technique for verifying it for a given lattice. In: Proceedings of ITA 2014. http:\/\/www.csun.edu\/~asethura\/papers\/ITA_2014Mod","DOI":"10.1109\/ITA.2014.6804279"},{"key":"267_CR22","unstructured":"Ernvall-Hyt\u00f6nen, A.-M., Sethuraman, B.A.: Counterexample to the Generalized Belfiore\u2013Sol\u00e9 Secrecy Function Conjecture for $$\\ell $$ \u2113 -Modular Lattices. arXiv:1409.3188v2 [cs.IT]"},{"key":"267_CR23","doi-asserted-by":"crossref","unstructured":"Lin, F., Oggier, F: Secrecy gain of Gaussian wiretap codes from 2-and 3-modular lattices. In: 2012 IEEE International Symposium on Information Theory (ISIT) pp. 1747\u20131751","DOI":"10.1109\/ISIT.2012.6283577"},{"key":"267_CR24","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1006\/jnth.1995.1111","volume":"54","author":"H-G Quebbemann","year":"1995","unstructured":"Quebbemann, H.-G.: Modular lattices in Euclidean spaces. J. Number Theory 54, 190\u2013202 (1995)","journal-title":"J. Number Theory"},{"key":"267_CR25","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1006\/jnth.1998.2306","volume":"73","author":"EM Rains","year":"1998","unstructured":"Rains, E.M., Sloane, N.J.A.: The shadow theory of modular and unimodular lattices. J. Number Theory 73, 359\u2013389 (1998)","journal-title":"J. Number Theory"},{"key":"267_CR26","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"267_CR27","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-6412-6","volume-title":"Algebraic Number Theory","author":"IN Stewart","year":"1979","unstructured":"Stewart, I.N., Tall, D.O.: Algebraic Number Theory. Chapman and Hall, London (1979)"},{"key":"267_CR28","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1006\/jcta.1996.2763","volume":"78","author":"Christine Bachoc","year":"1997","unstructured":"Bachoc, Christine: Applications of coding theory to the construction of modular lattices. J. Comb. Theory Ser. A 78, 92\u2013119 (1997)","journal-title":"J. Comb. Theory Ser. A"},{"issue":"1","key":"267_CR29","doi-asserted-by":"crossref","first-page":"73","DOI":"10.5802\/jtnb.347","volume":"14","author":"R Chapman","year":"2002","unstructured":"Chapman, R., Dougherty, S.T., Gaborit, P., Sol\u00e9, P.: 2-Modular lattices from ternary codes. J. de Th\u00e9orie des Nombres de Bordeaux tome 14(1), 73\u201385 (2002)","journal-title":"J. de Th\u00e9orie des Nombres de Bordeaux tome"},{"key":"267_CR30","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0909-6","volume-title":"Introduction to Elliptic Curves and Modular Forms. Graduate Texts in Math. No. 97","author":"N Koblitz","year":"1993","unstructured":"Koblitz, N.: Introduction to Elliptic Curves and Modular Forms. Graduate Texts in Math. No. 97, 2nd edn. Springer, New York (1993)","edition":"2"},{"key":"267_CR31","volume-title":"Sphere Packings, Lattices and Groups","author":"JH Conway","year":"1998","unstructured":"Conway, J.H., Sloane, N.J.A.: Sphere Packings, Lattices and Groups, 3rd edn. Springer, New York (1998)","edition":"3"},{"key":"267_CR32","volume-title":"Modular Functions and Dirichlet Series in Number Theory","author":"TM Apostol","year":"1977","unstructured":"Apostol, T.M.: Modular Functions and Dirichlet Series in Number Theory. Springer, Berlin (1977)"},{"key":"267_CR33","unstructured":"Wolfram Research Inc.: Mathematica, Version 8.0. Wolfram Research Inc, Champaign, IL (2010)"},{"key":"267_CR34","unstructured":"http:\/\/www.math.rwth-aachen.de\/Gabriele.Nebe\/LATTICES\/"},{"key":"267_CR35","unstructured":"http:\/\/magma.maths.usyd.edu.au\/magma\/"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-015-0267-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00200-015-0267-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-015-0267-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T19:45:10Z","timestamp":1566935110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00200-015-0267-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,29]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["267"],"URL":"https:\/\/doi.org\/10.1007\/s00200-015-0267-2","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,29]]}}}