Patent: Method for generating a key with perfect security2019
A. Grigorescu, H. BocheDifferential Power Analysis Attacks from an Information-Theoretic PerspectiveIEEE Information Theory Workshop IEEE2019
H. Boche, V. PohlThe Divergence of all Sampling-based Methods for Calculating the Spectral Factorization58th IEEE Conference on Decision and ControlIEEE2019
W. Haselmayr, A. Springer, G. Fischer, C. Alexiou, H. Boche, P.A. Höher, F. Dressler, R. SchoberIntegration of Molecular Communications into Future Generation Wireless Networks6G Wireless Summit6G2019
C. Kümmerle, C.M. VerdunCompletion of Structured Low-Rank Matrices via Iteratively Reweighted Least Squares13th International Conference on Sampling Theory and Applications SampTA 2019IEEE2019
H. Boche, M. Cai, N. CaiMessage Transmission over Classical Quantum Channels with a Jammer with Side Information, Correlation as Resource and Common Randomness Generating2019 IEEE International Symposium on Information TheoryISIT 2019IEEE2019
C. Arendt, J. Noetzel, H. BocheReliable Communication under the Influence of a State-Constrained Jammer: An Information-Theoretic Perspective on Receive DiversityProblems of Information Transmission201955Jul101–123
D.G. Lee, G.E. Pfander, V. Pohl, W. ZhouIdentification of Channels with Single and Multiple Inputs and Outputs under Linear ConstraintsLinear Agebra and Its Applications201958115Nov435-470
H. Boche, U.J. MönichDownsampling of Bounded Bandlimited Signals and the Bandlimited Interpolation: Analytic Properties and ComputabilityIEEE Transactions on Signal Processing201967246424-6439
S. Baur, N. Cai, M. Wiese, H. BocheSecret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect SecrecyIEEE International Workshop on Information Foresnics and SecurityWIFSIEEE2019