{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:01:46Z","timestamp":1767772906670,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/itw.2016.7606856","type":"proceedings-article","created":{"date-parts":[[2016,10,27]],"date-time":"2016-10-27T20:28:46Z","timestamp":1477600126000},"page":"359-363","source":"Crossref","is-referenced-by-count":11,"title":["Well-rounded lattices for reliability and security in Rayleigh fading SISO channels"],"prefix":"10.1109","author":[{"given":"Oliver Wilhelm","family":"Gnilke","sequence":"first","affiliation":[]},{"given":"Ha Thanh Nguyen","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Karrila","sequence":"additional","affiliation":[]},{"given":"Camilla","family":"Hollanti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Lattice codes for the wiretap gaussian channel: Construction and analysis","author":"oggier","year":"2015","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref11","first-page":"33","author":"ozarow","year":"1985","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2015.9.391"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2266396"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089361"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2541668"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02295-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1090\/S0894-0347-05-00483-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF01454863"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05167-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541866"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2343226"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133106"},{"article-title":"Information bounds and flatness factor approximation for fading wiretap channels","year":"2016","author":"karrila","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2008","journal-title":"Foundations and Trends in Communications and Information Theory"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITWF.2015.7360779"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963544"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1561\/0100000003","article-title":"Algebraic number theory and code design for rayleigh fading channels","volume":"1","author":"oggier","year":"2004","journal-title":"Foundations Trends Commun Inf Theory"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1142\/S1793042112501291"},{"article-title":"Full-diversity rotations","year":"0","author":"viterbo","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S179304211250011X"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133084"},{"key":"ref23","article-title":"Well-rounded lattices for reliability and security in SISO and MIMO rayleigh fading channels","author":"gnilke","year":"0","journal-title":"preparation"}],"event":{"name":"2016 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2016,9,11]]},"location":"Cambridge, United Kingdom","end":{"date-parts":[[2016,9,14]]}},"container-title":["2016 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592513\/7606780\/07606856.pdf?arnumber=7606856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:16:23Z","timestamp":1498356983000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7606856\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/itw.2016.7606856","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}