2015 IEEE International Symposium on Information Theory (ISIT) 2015
DOI: 10.1109/isit.2015.7282944
|View full text |Cite
|
Sign up to set email alerts
|

New bounds on the imbalance of a half-l-sequence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…The analysis in the remark following the proof of Theorem 2 in the Supplementary Note 3 provides insight into the relationship between the maximum quantum-secure covert communication throughput, the system parameters (reliability and detectability) and channel parameters (noise power level and transmissivity). However, establishing the exact relationship, as was done for classical covert communication 13 14 , would yield the equivalent of the channel capacity in standard reliable communication and enable characterization of the structured receivers that attain this maximum.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The analysis in the remark following the proof of Theorem 2 in the Supplementary Note 3 provides insight into the relationship between the maximum quantum-secure covert communication throughput, the system parameters (reliability and detectability) and channel parameters (noise power level and transmissivity). However, establishing the exact relationship, as was done for classical covert communication 13 14 , would yield the equivalent of the channel capacity in standard reliable communication and enable characterization of the structured receivers that attain this maximum.…”
Section: Discussionmentioning
confidence: 99%
“…Shannon capacity is thus inadequate for characterizing the limits of covert communication over the AWGN channel, and we developed new techniques to prove this square-root law (SRL). Since then, alternative techniques and insights, as well as further refinements to the SRL, have been found 13 14 . Even though the asymptotic rate of covert communication is zero (as ), a non-trivial burst of covert bits can be transmitted when n is large.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…[8] and later in Ref. [9–11]. We showed that the half‐ ℓ ‐sequences have ideal arithmetic correlations when p ≡ 1 (mod 8) and obtained an upper bound for p ≡ −1 (mod 8).…”
Section: Conclusion and Further Issuesmentioning
confidence: 74%
“…[8] and the statistical properties in Ref. [9,10]. The classical auto-correlations were investigated in Ref.…”
Section: Introductionmentioning
confidence: 99%