Activity: Talk or presentation types › Invited academic talk
In a classical wireless communications setting, a transmitter, Alice, wants to send a message to a receiver, Bob, through a possibly noisy channel. We consider the situation in which an eavesdropper, Eve tries to obtain the message through a more degraded channel. In this scenario, known as the wiretap channel, we want the transmission to be efficient, reliable and secure. Several design criteria based on lattice codes have been proposed with this aim. We will show how well-rounded lattices are specially good for these purposes and show how to choose the most convenient one. These can be obtained from number fields and quaternion algebras.
10 Jan 2020
Center for Mathematics and Computer Science, Netherlands