{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:21:59Z","timestamp":1740140519026,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,21]],"date-time":"2015-10-21T00:00:00Z","timestamp":1445385600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["ID0ESHAE408"],"award-info":[{"award-number":["ID0ESHAE408"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13638-015-0463-6","type":"journal-article","created":{"date-parts":[[2015,10,20]],"date-time":"2015-10-20T23:46:15Z","timestamp":1445384775000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Security gap analysis of some LDPC coded transmission schemes over the flat and fast fading Gaussian wire-tap channels"],"prefix":"10.1186","volume":"2015","author":[{"given":"Marco","family":"Baldi","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Maturo","sequence":"additional","affiliation":[]},{"given":"Giacomo","family":"Ricciutelli","sequence":"additional","affiliation":[]},{"given":"Franco","family":"Chiaraluce","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,21]]},"reference":[{"issue":"8","key":"463_CR1","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"AD Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975).","journal-title":"Bell Syst. Tech. J."},{"issue":"4","key":"463_CR2","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-Yan-Cheong","year":"1978","unstructured":"S Leung-Yan-Cheong, M Hellman, The Gaussian wire-tap channel. IEEE Trans. Inform. Theory. 24(4), 451\u2013456 (1978).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"463_CR3","doi-asserted-by":"crossref","unstructured":"D Klinc, J Ha, SW McLaughlin, J Barros, B-J Kwak, Proc. IEEE Information Theory Workshop (ITW 2009). LDPC codes for the Gaussian wiretap channel, (Taormina, Italy, 2009).","DOI":"10.1109\/ITW.2009.5351456"},{"issue":"8","key":"463_CR4","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","volume":"53","author":"A Thangaraj","year":"2007","unstructured":"A Thangaraj, S Dihidar, AR Calderbank, SW McLaughlin, J-M Merolla, Applications of LDPC codes to the wiretap channel. IEEE Trans. Inform. Theory. 53(8), 2933\u20132945 (2007).","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"463_CR5","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y Liang","year":"2008","unstructured":"Y Liang, HV Poor, S Shamai (Shitz), LDPC block and convolutional codes based on circulant matrices. IEEE Trans. Inform. Theory. 54(6), 2470\u20132492 (2008).","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"463_CR6","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TIFS.2011.2139208","volume":"6","author":"CW Wong","year":"2011","unstructured":"CW Wong, TF Wong, JM Shea, Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel. IEEE Trans. Inf. Forensics Secur. 6(3), 551\u2013564 (2011).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"463_CR7","doi-asserted-by":"crossref","unstructured":"M Baldi, G Ricciutelli, N Maturo, F Chiaraluce, Proc. IEEE International Conference on Communications (ICC, 2015) - Workshop on Wireless Physical Layer Security. Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel, (London, UK, 2015).","DOI":"10.1109\/ICCW.2015.7247218"},{"key":"463_CR8","doi-asserted-by":"crossref","unstructured":"J Lu, J Harshan, F Oggier, in Proc. IEEE Information Theory Workshop (ITW 2014). A USRP implementation of wiretap lattice codes (Hobart, Tasmania, 2014), pp. 316\u2013320.","DOI":"10.1109\/ITW.2014.6970845"},{"issue":"2","key":"463_CR9","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/18.910577","volume":"47","author":"TJ Richardson","year":"2001","unstructured":"TJ Richardson, RL Urbanke, The capacity of low-density parity-check codes under message-passing decoding. IEEE Trans. Inform. Theory. 47(2), 599\u2013618 (2001).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"463_CR10","doi-asserted-by":"crossref","unstructured":"D Klinc, J Ha, SW McLaughlin, J Barros, B-J Kwak, Proc. IEEE Global Telecommunications Conference (GLOBECOM, 2009). LDPC codes for physical layer security, (Honolulu, HI, 2009).","DOI":"10.1109\/GLOCOM.2009.5426065"},{"issue":"3","key":"463_CR11","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","volume":"6","author":"D Klinc","year":"2011","unstructured":"D Klinc, J Ha, SW McLaughlin, J Barros, B-J Kwak, LDPC codes for the Gaussian wiretap channel. IEEE Trans. Inf. Forensics Secur. 6(3), 532\u2013540 (2011).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"463_CR12","doi-asserted-by":"crossref","unstructured":"M Baldi, M Bianchi, F Chiaraluce, Proc. IEEE Information Theory Workshop (ITW 2010). Non-systematic codes for physical layer security, (Dublin, Ireland, 2010).","DOI":"10.1109\/CIG.2010.5592833"},{"key":"463_CR13","doi-asserted-by":"crossref","unstructured":"M Baldi, M Bianchi, F Chiaraluce, Proc. IEEE International Conference on Communications (ICC, 2011) - Workshop on Physical Layer Security. Increasing physical layer security through scrambled codes and ARQ, (Kyoto, Japan, 2011).","DOI":"10.1109\/iccw.2011.5963540"},{"issue":"3","key":"463_CR14","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TIFS.2012.2187515","volume":"7","author":"M Baldi","year":"2012","unstructured":"M Baldi, M Bianchi, F Chiaraluce, Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: a security gap analysis. IEEE Trans. Inf. Forensics Secur. 7(3), 883\u2013894 (2012).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"463_CR15","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/WCL.2012.122612.120787","volume":"2","author":"M Baldi","year":"2013","unstructured":"M Baldi, M Bianchi, N Maturo, F Chiaraluce, A physical layer secured key distribution technique for IEEE 802.11g wireless networks. IEEE Wireless Commun. Lett. 2(2), 183\u2013186 (2013).","journal-title":"IEEE Wireless Commun. Lett."},{"key":"463_CR16","doi-asserted-by":"crossref","unstructured":"M Baldi, M Bianchi, N Maturo, F Chiaraluce, Proc. 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013). A tight estimation of the security gap over the fast fading wiretap channel, (Cagliari, Italy, 2013).","DOI":"10.1109\/IWCMC.2013.6583549"},{"key":"463_CR17","doi-asserted-by":"crossref","unstructured":"M Baldi, N Maturo, G Ricciutelli, F Chiaraluce, Proc. 21st International Conference on Telecommunications (ICT 2014). LDPC coded transmissions over the Gaussian broadcast channel with confidential messages, (Lisbon, Portugal, 2014).","DOI":"10.1109\/ICT.2014.6845079"},{"key":"463_CR18","doi-asserted-by":"crossref","unstructured":"M Baldi, N Maturo, G Ricciutelli, F Chiaraluce, Proc. IEEE International Conference on Communications (ICC 2014) \u2013 Workshop on Wireless Physical Layer Security. Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages, (Sydney, Australia, 2014).","DOI":"10.1109\/ICCW.2014.6881291"},{"key":"463_CR19","doi-asserted-by":"crossref","unstructured":"N Maturo, M Baldi, M Bianchi, F Chiaraluce, Proc. International Conference on Telecommunications and Signal Processing (TSP 2013). Security gap performance of some LDPC code constructions, (Rome, Italy, 2013).","DOI":"10.1109\/TSP.2013.6613895"},{"key":"463_CR20","unstructured":"XY Hu, E Eleftheriou, Proc. IEEE Global Telecommunications Conference (GLOBECOM\u201901). Progressive edge-growth Tanner graphs, (San Antonio, Texas, 2001)."},{"key":"463_CR21","unstructured":"M Baldi, M Bianchi, G Cancellieri, F Chiaraluce, T Kl\u00f8ve, Proc. International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2012). On the generator matrix of array LDPC codes, (Split, Croatia, 2012)."},{"issue":"9","key":"463_CR22","doi-asserted-by":"publisher","first-page":"6052","DOI":"10.1109\/TIT.2011.2161953","volume":"57","author":"M Baldi","year":"2011","unstructured":"M Baldi, F Bambozzi, F Chiaraluce, On a family of circulant matrices for quasi-cyclic low-density generator matrix codes. IEEE Trans. Inform. Theory. 57(9), 6052\u20136067 (2011).","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"463_CR23","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/LCOMM.2002.808375","volume":"7","author":"SJ Johnson","year":"2003","unstructured":"SJ Johnson, SR Weller, A family of irregular LDPC codes with low encoding complexity. IEEE Commun. Lett. 7(2), 79\u201381 (2003).","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"463_CR24","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/LCOMM.2009.081766","volume":"13","author":"M Baldi","year":"2009","unstructured":"M Baldi, G Cancellieri, A Carassai, F Chiaraluce, LDPC codes based on serially concatenated multiple parity-check codes. IEEE Commun. Lett. 13(2), 142\u2013144 (2009).","journal-title":"IEEE Commun. Lett."},{"issue":"10","key":"463_CR25","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1109\/TCOMM.2003.818085","volume":"51","author":"JSK Tee","year":"2003","unstructured":"JSK Tee, DP Taylor, PA Martin, Multiple serial and parallel concatenated single parity-check codes. IEEE Trans. Commun. 51(10), 1666\u20131675 (2003).","journal-title":"IEEE Trans. Commun."},{"key":"463_CR26","doi-asserted-by":"crossref","unstructured":"M Baldi, G Cancellieri, F Chiaraluce, Proc. International Conference on Advances in Satellite and Space Communications (SPACOMM 2009). A class of low-density parity-check product codes, (Colmar, France, 2009).","DOI":"10.1109\/SPACOMM.2009.25"},{"key":"463_CR27","unstructured":"Z Qi, NC Sum, Proc. International Conference on Communications Systems (ICCS, 2004). LDPC product codes, (Krakow, Poland, 2004)."},{"issue":"4","key":"463_CR28","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1109\/TCOMM.2012.030712.100173","volume":"60","author":"M Baldi","year":"2012","unstructured":"M Baldi, G Cancellieri, F Chiaraluce, Interleaved product LDPC codes. IEEE Trans. Commun. 60(4), 895\u2013901 (2012).","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"463_CR29","doi-asserted-by":"publisher","first-page":"453","DOI":"10.4218\/etrij.06.0105.0187","volume":"28","author":"O Gazi","year":"2006","unstructured":"O Gazi, AO Yilmaz, Turbo product codes based on convolutional codes. ETRI J. 28(4), 453\u2013460 (2006).","journal-title":"ETRI J."},{"issue":"12","key":"463_CR30","doi-asserted-by":"publisher","first-page":"2966","DOI":"10.1109\/TIT.2004.838370","volume":"50","author":"RM Tanner","year":"2004","unstructured":"RM Tanner, D Sridhara, A Sridharan, TE Fuja, DJ Costello, LDPC block and convolutional codes based on circulant matrices. IEEE Trans. Inform. Theory. 50(12), 2966\u20132984 (2004).","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"11","key":"463_CR31","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.1109\/LCOMM.2012.091212.121230","volume":"16","author":"M Baldi","year":"2012","unstructured":"M Baldi, M Bianchi, G Cancellieri, F Chiaraluce, Progressive differences convolutional low-density parity-check codes. IEEE Commun. Lett. 16(11), 1848\u20131851 (2012).","journal-title":"IEEE Commun. Lett."},{"key":"463_CR32","doi-asserted-by":"crossref","unstructured":"M Baldi, F Chiaraluce, Proc. IEEE International Symposium on Information Theory (ISIT 2007). Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes, (Nice, France, 2007).","DOI":"10.1109\/ISIT.2007.4557609"},{"issue":"2","key":"463_CR33","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TBC.2009.2016498","volume":"55","author":"M Baldi","year":"2009","unstructured":"M Baldi, G Cancellieri, F Chiaraluce, Finite-precision analysis of demappers and decoders for LDPC-coded M-QAM systems. IEEE Trans. Broadcast. 55(2), 239\u2013250 (2009).","journal-title":"IEEE Trans. Broadcast."},{"issue":"3","key":"463_CR34","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1002\/j.1538-7305.1959.tb03905.x","volume":"38","author":"CE Shannon","year":"1959","unstructured":"CE Shannon, Probability of error for optimal codes in a Gaussian channel. Bell Syst. Tech. J. 38(3), 611\u2013656 (1959).","journal-title":"Bell Syst. Tech. J."},{"issue":"9","key":"463_CR35","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1109\/TIFS.2014.2348915","volume":"11","author":"M Baldi","year":"2014","unstructured":"M Baldi, F Chiaraluce, N Laurenti, S Tomasin, F Renna, Secrecy transmission on parallel channels: theoretical limits and performance of practical codes. IEEE Trans. Inf. Forensics Secur. 11(9), 1765\u20131779 (2014).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"463_CR36","doi-asserted-by":"crossref","unstructured":"M Baldi, M Bianchi, N Maturo, F Chiaraluce, Proc. IEEE Symposium on Computers and Communications (ISCC, 2013). A practical viewpoint on the performance of LDPC codes over the fast Rayleigh fading wire-tap channel, (Split, Croatia, 2013).","DOI":"10.1109\/ISCC.2013.6754961"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0463-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-015-0463-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0463-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0463-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T15:13:07Z","timestamp":1567264387000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-015-0463-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,21]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["463"],"URL":"https:\/\/doi.org\/10.1186\/s13638-015-0463-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2015,10,21]]},"article-number":"232"}}