{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T04:10:05Z","timestamp":1748059805840,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T00:00:00Z","timestamp":1540771200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T00:00:00Z","timestamp":1540771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1761280"],"award-info":[{"award-number":["1761280"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007472","name":"Funda\u00e7\u00e3o Luso-Americana para o Desenvolvimento","doi-asserted-by":"crossref","award":["INCISE"],"award-info":[{"award-number":["INCISE"]}],"id":[{"id":"10.13039\/501100007472","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Fundos Europeus Estruturais e de Investimento","award":["PTDC\/EEI-TEL\/3684\/2014"],"award-info":[{"award-number":["PTDC\/EEI-TEL\/3684\/2014"]}]},{"name":"Fundos Europeus Estruturais e de Investimento","award":["PTDC\/EEI-TEL\/3684\/2014"],"award-info":[{"award-number":["PTDC\/EEI-TEL\/3684\/2014"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["POCI-01-0145- FEDER-016753 and UID\/EEA\/50008\/2013"],"award-info":[{"award-number":["POCI-01-0145- FEDER-016753 and UID\/EEA\/50008\/2013"]}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["POCI-01-0145- FEDER-016753 and UID\/EEA\/50008\/2013"],"award-info":[{"award-number":["POCI-01-0145- FEDER-016753 and UID\/EEA\/50008\/2013"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1276-1","type":"journal-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T13:54:22Z","timestamp":1540821262000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Analysis of short blocklength codes for secrecy"],"prefix":"10.1186","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9375-9440","authenticated-orcid":false,"given":"Willie","family":"K. Harrison","sequence":"first","affiliation":[]},{"given":"Dinis","family":"Sarmento","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"P. Vilela","sequence":"additional","affiliation":[]},{"given":"Marco","family":"A. C. Gomes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,29]]},"reference":[{"issue":"5","key":"1276_CR1","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2013.2265141","volume":"30","author":"W.K. Harrison","year":"2013","unstructured":"W.K. Harrison, J. Almeida, M.R. Bloch, S.W. McLaughlin, J. Barros, Coding for secrecy: an overview of error-control coding techniques for physical-layer security. IEEE Signal Process. Mag. 30(5), 41\u201350 (2013).","journal-title":"IEEE Signal Process. Mag"},{"issue":"3","key":"1276_CR2","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A. Mukherjee","year":"2014","unstructured":"A. Mukherjee, S.A.A. Fakoorian, J. Huang, A.L. Swindlehurst, Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tuts.16(3), 1550\u20131573 (2014).","journal-title":"IEEE Commun. Surv. Tuts."},{"issue":"10","key":"1276_CR3","doi-asserted-by":"publisher","first-page":"6399","DOI":"10.1109\/TIT.2014.2343226","volume":"60","author":"C. Ling","year":"2014","unstructured":"C. Ling, L. Luzzi, J. -C. Belfiore, D. Stehle, Semantically secure lattice codes for the Gaussian wiretap channel. IEEE Trans. Inf. Theory. 60(10), 6399\u20136416 (2014).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"1276_CR4","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1109\/JPROC.2015.2463678","volume":"103","author":"M. Bloch","year":"2015","unstructured":"M. Bloch, M. Hayashi, A. Thangaraj, Error-control coding for physical-layer secrecy. Proc. IEEE. 103(10), 1725\u20131746 (2015).","journal-title":"Proc. IEEE"},{"issue":"3","key":"1276_CR5","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","volume":"6","author":"D. Klinc","year":"2011","unstructured":"D. Klinc, J. Ha, S.W. McLaughlin, J. Barros, B. -J. Kwak, LDPC codes for the Gaussian wiretap channel. IEEE Trans. Inf. Forensics Secur. 6(3), 532\u2013540 (2011).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"3","key":"1276_CR6","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/LSP.2015.2511821","volume":"23","author":"J.P. Vilela","year":"2016","unstructured":"J.P. Vilela, M. Gomes, W.K. Harrison, D. Sarmento, F. Dias, Interleaved concatenated coding for secrecy in the finite blocklength regime. IEEE Sig. Process. Lett. 23(3), 356\u2013360 (2016).","journal-title":"IEEE Sig. Process. Lett"},{"issue":"8","key":"1276_CR7","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A.D. Wyner","year":"1975","unstructured":"A.D. Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975).","journal-title":"Bell Syst. Tech. J"},{"issue":"3","key":"1276_CR8","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csiszar","year":"1978","unstructured":"I. Csiszar, J. Korner, Broadcast channels with confidential messages. IEEE Trans. Inf. Theory. 24(3), 339\u2013348 (1978).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"1276_CR9","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","volume":"53","author":"A. Thangaraj","year":"2007","unstructured":"A. Thangaraj, S. Dihidar, A.R. Calderbank, S.W. McLaughlin, J. -M. Merolla, Applications of LDPC codes to the wiretap channel. IEEE Trans. Inf. Theory. 53(8), 2933\u20132945 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1276_CR10","unstructured":"A.T. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, S.W. McLaughlin, in Proc. IEEE Information Theory Workshop (ITW). Strong secrecy for erasure wiretap channels, (2010), pp. 1\u20135."},{"issue":"3","key":"1276_CR11","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TIFS.2011.2148715","volume":"6","author":"A. Subramanian","year":"2011","unstructured":"A. Subramanian, A. Thangaraj, M. Bloch, S.W. McLaughlin, Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Trans. Inf. Forensics Secur. 6(3), 585\u2013594 (2011).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"1276_CR12","unstructured":"A.K. Pradhan, A. Subramanian, A. Thangaraj, in Proc. IEEE Int. Symp. Information Theory (ISIT). Deterministic constructions for large girth protograph LDPC codes, (2013), pp. 1680\u20131684."},{"key":"1276_CR13","doi-asserted-by":"crossref","unstructured":"M. Bloch, J. Barros, Physical Layer Security: From Information Theory to Security Engineering (Cambridge University Press, 2011).","DOI":"10.1017\/CBO9780511977985"},{"key":"1276_CR14","unstructured":"M. Baldi, M. Bianchi, F. Chiaraluce, in Proc. IEEE Information Theory Workshop (ITW). Non-systematic codes for physical layer security, (2010), pp. 1\u20135."},{"issue":"3","key":"1276_CR15","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TIFS.2012.2187515","volume":"7","author":"M. Baldi","year":"2012","unstructured":"M. Baldi, M. Bianchi, F. Chiaraluce, Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: a security gap analysis. IEEE Trans. Inf. Forensic Secur. 7(3), 883\u2013894 (2012).","journal-title":"IEEE Trans. Inf. Forensic Secur"},{"key":"1276_CR16","volume-title":"Applied Statistics and Probability for Engineers","author":"D.C. Montgomery","year":"2011","unstructured":"D.C. Montgomery, G.C. Runger, Applied Statistics and Probability for Engineers, 5th edn (Wiley, Hoboken, 2011)."},{"key":"1276_CR17","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28:, 656\u2013715 (1949).","journal-title":"Bell Syst. Tech. J"},{"key":"1276_CR18","doi-asserted-by":"crossref","unstructured":"U.M. Maurer, in Communications and Cryptography: Two Sides of One Tapestry. The strong secret key rate of discrete random triples (Kluwer Academic Publishers, 1994), pp. 271\u2013285.","DOI":"10.1007\/978-1-4615-2694-0_27"},{"key":"1276_CR19","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Tessaro, A. Vardy, in Advances in Cryptology \u2013 CRYPTO 2012, ed. by R. Safavi-Naini, R. Canetti. Lecture Notes in Computer Science, vol 7417. Semantic security for the wiretap channel (Springer, 2012), pp. 294\u2013311.","DOI":"10.1007\/978-3-642-32009-5_18"},{"key":"1276_CR20","doi-asserted-by":"crossref","unstructured":"U. Maure, S. Wolf, in Advances in Cryptology \u2014 EUROCRYPT 2000, ed. by B. Preneel. Lecture Notes in Computer Science, vol 1807. Information-theoretic key agreement: From weak to strong secrecy for free (Springer, 2000), pp. 351\u2013368.","DOI":"10.1007\/3-540-45539-6_24"},{"key":"1276_CR21","doi-asserted-by":"crossref","unstructured":"M. Baldi, F. Chiaraluce, N. Maturo, S. Tomasin, in Physical and Data-Link Security Techniques for Future Communication Systems, ed. by M. Baldi, S. Tomasin. Lecture Notes in Electrical Engineering, vol. 358. Performance analysis of transmission over AWGN wiretap channels with practical codes (Springer, 2016), pp. 53\u201368.","DOI":"10.1007\/978-3-319-23609-4_4"},{"issue":"3","key":"1276_CR22","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/TIFS.2011.2145371","volume":"6","author":"W.K. Harrison","year":"2011","unstructured":"W.K. Harrison, J. Almeida, S.W. McLaughlin, J. Barros, Coding for cryptographic security enhancement using stopping sets. IEEE Trans. Inf. Forens. Security. 6(3), 575\u2013584 (2011).","journal-title":"IEEE Trans. Inf. Forens. Security"},{"key":"1276_CR23","unstructured":"J. Pfister, M.A.C. Gomes, J.P. Vilela, W.K. Harrison, in Proc. IEEE International Conference on Communications (ICC). Quantifying equivocation for finite blocklength wiretap codes, (2017), pp. 1\u20136."},{"key":"1276_CR24","unstructured":"C.W. Wong, T.F. Wong, J.M. Shea, in Proc. IEEE GLOBECOM Workshops (GC Wkshps). LDPC code design for the BPSK-constrained Gaussian wiretap channel, (2011), pp. 898\u2013902."},{"key":"1276_CR25","unstructured":"M. Baldi, G. Ricciutelli, N. Maturo, F. Chiaraluce, in Proc. IEEE International Conference on Communication Workshop (ICCW). Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel, (2015), pp. 435\u2013440."},{"key":"1276_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/0471739219","volume-title":"Error Correction Coding: Mathematical Methods and Algorithms","author":"T.K. Moon","year":"2005","unstructured":"T.K. Moon, Error Correction Coding: Mathematical Methods and Algorithms (Wiley, Hoboken, 2005)."},{"key":"1276_CR27","unstructured":"D. Sarmento, J. Vilela, W.K. Harrison, M. Gomes, in Proc. IEEE Global Telecommunications Conference (GLOBECOM). Interleaved coding for secrecy with a hidden key, (2015), pp. 1\u20136."},{"issue":"3","key":"1276_CR28","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/TIFS.2011.2142305","volume":"6","author":"J.P. Vilela","year":"2011","unstructured":"J.P. Vilela, P.C. Pinto, J. Barros, Position-based jamming for enhanced wireless secrecy. IEEE Trans. Inf. Forensic Secur.6(3), 616\u2013627 (2011).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"1276_CR29","doi-asserted-by":"crossref","unstructured":"J.P. Vilela, J. Barros, in Proc. IEEE International Workshop on Data Security and PrivAcy in Wireless Networks (held Jointly with IEEE WoWMoM). Collision-free jamming for enhanced wireless secrecy (Madrid, 2013).","DOI":"10.1109\/WoWMoM.2013.6583466"},{"issue":"10","key":"1276_CR30","doi-asserted-by":"publisher","first-page":"6692","DOI":"10.1109\/TIT.2011.2165800","volume":"57","author":"Y. Liang","year":"2011","unstructured":"Y. Liang, H.V. Poor, L. Ying, Secrecy throughput of MANETs under passive and active attacks. IEEE Trans. Inf. Theory. 57(10), 6692\u20136702 (2011).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"1276_CR31","doi-asserted-by":"publisher","first-page":"6428","DOI":"10.1109\/TIT.2011.2162275","volume":"57","author":"H. Mahdavifar","year":"2011","unstructured":"H. Mahdavifar, A. Vardy, Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Trans. Inf. Theory. 57(10), 6428\u20136443 (2011).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1276_CR32","unstructured":"H. Zheng, W. Mav, Y. Choi, S. Zhang, Link performance abstraction for ML receivers based on RBIR metrics. Google Patents. US Patent App. 12\/207,497 (2010). http:\/\/www.google.com\/patents\/US20100064185 . Accessed Apr 2018."},{"key":"1276_CR33","volume-title":"Elements of Information Theory","author":"T. M. Cover","year":"2006","unstructured":"T. M. Cover, J.A. Thomas, Elements of Information Theory (Wiley, Hoboken, 2006)."},{"key":"1276_CR34","doi-asserted-by":"publisher","unstructured":"E. Barker, Guideline for using cryptographic standards in the federal government: cryptographic mechanisms. Technical report, National Institute of Standards and Technology (NIST) (2016). https:\/\/doi.org\/10.6028\/NIST.SP.800-175B . Accessed Apr 2018.","DOI":"10.6028\/NIST.SP.800-175B"},{"key":"1276_CR35","unstructured":"N.D. Jorstad, L.T. Smith Jr., Cryptographic algorithm metrics. Technical report, Institute for Defense Analyses (IDA): Science and Technology Division (1997)."},{"key":"1276_CR36","unstructured":"W.K. Harrison, S.W. McLaughlin, in Proc. IEEE Int. Conf. Communications (ICC). Physical-layer security: combining error control coding and cryptography, (2009), pp. 1\u20135."},{"key":"1276_CR37","unstructured":"W.K. Harrison, S.W. McLaughlin, in Proc. IEEE Int. Symp. Information Theory (ISIT). Tandem coding and cryptography on wiretap channels: EXIT chart analysis, (2009), pp. 1939\u20131943."},{"key":"1276_CR38","unstructured":"N.L. Gross, W.K. Harrison, in Proc. IEEE Int. Conf. Communications (ICC). An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext, (2014), pp. 749\u2013754."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1276-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1276-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1276-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T21:07:22Z","timestamp":1662325642000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1276-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,29]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1276"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1276-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2018,10,29]]},"assertion":[{"value":"6 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"255"}}