{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:00:12Z","timestamp":1767772812134,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000782","name":"European Science Foundation through the ESF COST Action IC1104 to the ANTA Group","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000782","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003125","name":"Finnish Cultural Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003125","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["268364"],"award-info":[{"award-number":["268364"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["276031","282938","283262","303819"],"award-info":[{"award-number":["276031","282938","283262","303819"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technical University of Munich\u2013Institute for Advanced Study"},{"DOI":"10.13039\/100011102","name":"German Excellence Initiative and the EU Seventh Framework Programme, via a Hans Fischer Fellowship","doi-asserted-by":"publisher","award":["291763"],"award-info":[{"award-number":["291763"]}],"id":[{"id":"10.13039\/100011102","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tit.2021.3059749","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T15:44:14Z","timestamp":1613663054000},"page":"3645-3663","source":"Crossref","is-referenced-by-count":8,"title":["Well-Rounded Lattices: Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels"],"prefix":"10.1109","volume":"67","author":[{"given":"Mohamed Taoufiq","family":"Damir","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9769-0372","authenticated-orcid":false,"given":"Alex","family":"Karrila","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7458-928X","authenticated-orcid":false,"given":"Laia","family":"Amoros","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1614-7464","authenticated-orcid":false,"given":"Oliver W.","family":"Gnilke","sequence":"additional","affiliation":[]},{"given":"David","family":"Karpuk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5356-8669","authenticated-orcid":false,"given":"Camilla","family":"Hollanti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1137\/19M1275334"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133106"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4007\/annals.2009.170.1003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF01201341"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2016-7"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2009","journal-title":"Found Trends Commun Inf Theory"},{"key":"ref37","article-title":"Performance of lattice coset codes on universal software radio peripherals","author":"lu","year":"2016","journal-title":"arXiv 1607 07163"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1561\/0100000003"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00013-007-2258-4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02295-1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00013-018-1232-7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181960"},{"key":"ref29","article-title":"Bases of minimal vectors in Lagrangian lattices","author":"taoufiq damir","year":"2020","journal-title":"arXiv 2006 16794"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2016.7878822"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2016.7606856"},{"journal-title":"Perfect Lattices in Euclidean Spaces","year":"2010","author":"martinet","key":"ref20"},{"key":"ref22","volume":"48","author":"schurmann","year":"2009","journal-title":"Computational Geometry of Positive Definite Quadratic Forms Polyhedral Reduction Theories Algorithms and Applications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1515\/crll.1908.133.97"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1215\/S0012-7094-84-05123-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1090\/S0894-0347-05-00483-2"},{"key":"ref26","first-page":"999","article-title":"Canonical basis twists of ideal lattices from real quadratic number fields","volume":"45","author":"damir","year":"2019","journal-title":"Houston J Math"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11856-019-1912-4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03983-0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1142\/S179304211250011X"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2003.1216744"},{"journal-title":"Full Diversity Rotations","year":"2005","author":"viterbo","key":"ref54"},{"journal-title":"Planewalker sphere decoder implementation","year":"2018","author":"pyrr\u00f6","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s00013-005-1469-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2343226"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2857487"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-01-06080-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2332343"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2875004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2794327"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963544"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.061913.120278"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITWF.2015.7360779"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2015.9.391"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2266396"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445937"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2016.7878824"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541866"},{"key":"ref5","article-title":"On analytical and geometric lattice design criteria for wiretap coset codes","author":"karrila","year":"2016","journal-title":"arXiv 1609 07723v2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1984.tb00072.x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/241\/03628"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2494594"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5802\/jtnb.474"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1155\/IMRN\/2006\/49620"},{"key":"ref48","first-page":"991","article-title":"A contribution to the theory of the extrema of a multi-dimensional ?-function","volume":"173","author":"delone","year":"1967","journal-title":"Doklady Akademii Nauk"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/0022-314X(80)90062-1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s00222-005-0488-2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgebra.2014.12.044"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnt.2012.05.002"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9437270\/09354828.pdf?arnumber=9354828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:54:29Z","timestamp":1652194469000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9354828\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":55,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tit.2021.3059749","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}