{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2011:MA2EXVT73H5ZJAL7QIJ2UM6HFN","short_pith_number":"pith:MA2EXVT7","canonical_record":{"source":{"id":"1106.2756","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-06-14T16:24:11Z","cross_cats_sorted":[],"title_canon_sha256":"fdc6572baf3f58b7dd0b71a354db07af3f71953c8b2a7c866f4877aef870a5b6","abstract_canon_sha256":"4318f7fb8227107a6a74d3e97e3c6a096c3619ee10bf29b62b4e194d18aa6522"},"schema_version":"1.0"},"canonical_sha256":"60344bd67fd9fb94817f8213aa33c72b6e761b8ce661618e09965f201376746d","source":{"kind":"arxiv","id":"1106.2756","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1106.2756","created_at":"2026-05-18T04:01:26Z"},{"alias_kind":"arxiv_version","alias_value":"1106.2756v1","created_at":"2026-05-18T04:01:26Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1106.2756","created_at":"2026-05-18T04:01:26Z"},{"alias_kind":"pith_short_12","alias_value":"MA2EXVT73H5Z","created_at":"2026-05-18T12:26:34Z"},{"alias_kind":"pith_short_16","alias_value":"MA2EXVT73H5ZJAL7","created_at":"2026-05-18T12:26:34Z"},{"alias_kind":"pith_short_8","alias_value":"MA2EXVT7","created_at":"2026-05-18T12:26:34Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2011:MA2EXVT73H5ZJAL7QIJ2UM6HFN","target":"record","payload":{"canonical_record":{"source":{"id":"1106.2756","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-06-14T16:24:11Z","cross_cats_sorted":[],"title_canon_sha256":"fdc6572baf3f58b7dd0b71a354db07af3f71953c8b2a7c866f4877aef870a5b6","abstract_canon_sha256":"4318f7fb8227107a6a74d3e97e3c6a096c3619ee10bf29b62b4e194d18aa6522"},"schema_version":"1.0"},"canonical_sha256":"60344bd67fd9fb94817f8213aa33c72b6e761b8ce661618e09965f201376746d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:01:26.224815Z","signature_b64":"CtArCtLF4vxAipV+v4/7Zqhe9NAU1Ftn6+PWl4AHMP4zHo3Z2NHjkFYc7u5WBRuuemj3CwBPCJ2pu15QVO8VDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"60344bd67fd9fb94817f8213aa33c72b6e761b8ce661618e09965f201376746d","last_reissued_at":"2026-05-18T04:01:26.224253Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:01:26.224253Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1106.2756","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:01:26Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"iv6P0CuMefngGfsxC3tA72u+TTUOAqRE7H81fULcXSC+mIFUfALdTu2znto3pYTpceS9vkZrrmgr961iyyiKCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T10:27:33.678294Z"},"content_sha256":"af5c1371e5e4e05ddde5cf455622db20e3a0538c7ce2ce46fca6abdb0a7fa85b","schema_version":"1.0","event_id":"sha256:af5c1371e5e4e05ddde5cf455622db20e3a0538c7ce2ce46fca6abdb0a7fa85b"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2011:MA2EXVT73H5ZJAL7QIJ2UM6HFN","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"On the Eavesdropper's Correct Decision in Gaussian and Fading Wiretap Channels Using Lattice Codes","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Anne-Maria Ernvall-Hyt\\\"onen, Camilla Hollanti","submitted_at":"2011-06-14T16:24:11Z","abstract_excerpt":"In this paper, the probability of Eve the Eavesdropper's correct decision is considered both in the Gaussian and Rayleigh fading wiretap channels when using lattice codes for the transmission.\n  First, it is proved that the secrecy function determining Eve's performance attains its maximum at y=1 on all known extremal even unimodular lattices. This is a special case of a conjecture by Belfiore and Sol\\'e. Further, a very simple method to verify or disprove the conjecture on any given unimodular lattice is given.\n  Second, preliminary analysis on the behavior of Eve's probability of correct dec"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1106.2756","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:01:26Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"6P32HkoukJB4t5p+fHjpPTaZsbnBPLJP/ou3nBpFEnwfw1WAWRfwRFUBj74JrkHUYm5yIjgtYUCxmNEglHLMAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T10:27:33.678658Z"},"content_sha256":"7ff672b1ee77db903646b6e1cd1e77a9b4fe5c08d8235ff275247836e5b27842","schema_version":"1.0","event_id":"sha256:7ff672b1ee77db903646b6e1cd1e77a9b4fe5c08d8235ff275247836e5b27842"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/MA2EXVT73H5ZJAL7QIJ2UM6HFN/bundle.json","state_url":"https://pith.science/pith/MA2EXVT73H5ZJAL7QIJ2UM6HFN/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/MA2EXVT73H5ZJAL7QIJ2UM6HFN/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T10:27:33Z","links":{"resolver":"https://pith.science/pith/MA2EXVT73H5ZJAL7QIJ2UM6HFN","bundle":"https://pith.science/pith/MA2EXVT73H5ZJAL7QIJ2UM6HFN/bundle.json","state":"https://pith.science/pith/MA2EXVT73H5ZJAL7QIJ2UM6HFN/state.json","well_known_bundle":"https://pith.science/.well-known/pith/MA2EXVT73H5ZJAL7QIJ2UM6HFN/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2011:MA2EXVT73H5ZJAL7QIJ2UM6HFN","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"4318f7fb8227107a6a74d3e97e3c6a096c3619ee10bf29b62b4e194d18aa6522","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-06-14T16:24:11Z","title_canon_sha256":"fdc6572baf3f58b7dd0b71a354db07af3f71953c8b2a7c866f4877aef870a5b6"},"schema_version":"1.0","source":{"id":"1106.2756","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1106.2756","created_at":"2026-05-18T04:01:26Z"},{"alias_kind":"arxiv_version","alias_value":"1106.2756v1","created_at":"2026-05-18T04:01:26Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1106.2756","created_at":"2026-05-18T04:01:26Z"},{"alias_kind":"pith_short_12","alias_value":"MA2EXVT73H5Z","created_at":"2026-05-18T12:26:34Z"},{"alias_kind":"pith_short_16","alias_value":"MA2EXVT73H5ZJAL7","created_at":"2026-05-18T12:26:34Z"},{"alias_kind":"pith_short_8","alias_value":"MA2EXVT7","created_at":"2026-05-18T12:26:34Z"}],"graph_snapshots":[{"event_id":"sha256:7ff672b1ee77db903646b6e1cd1e77a9b4fe5c08d8235ff275247836e5b27842","target":"graph","created_at":"2026-05-18T04:01:26Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper, the probability of Eve the Eavesdropper's correct decision is considered both in the Gaussian and Rayleigh fading wiretap channels when using lattice codes for the transmission.\n  First, it is proved that the secrecy function determining Eve's performance attains its maximum at y=1 on all known extremal even unimodular lattices. This is a special case of a conjecture by Belfiore and Sol\\'e. Further, a very simple method to verify or disprove the conjecture on any given unimodular lattice is given.\n  Second, preliminary analysis on the behavior of Eve's probability of correct dec","authors_text":"Anne-Maria Ernvall-Hyt\\\"onen, Camilla Hollanti","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-06-14T16:24:11Z","title":"On the Eavesdropper's Correct Decision in Gaussian and Fading Wiretap Channels Using Lattice Codes"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1106.2756","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:af5c1371e5e4e05ddde5cf455622db20e3a0538c7ce2ce46fca6abdb0a7fa85b","target":"record","created_at":"2026-05-18T04:01:26Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"4318f7fb8227107a6a74d3e97e3c6a096c3619ee10bf29b62b4e194d18aa6522","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2011-06-14T16:24:11Z","title_canon_sha256":"fdc6572baf3f58b7dd0b71a354db07af3f71953c8b2a7c866f4877aef870a5b6"},"schema_version":"1.0","source":{"id":"1106.2756","kind":"arxiv","version":1}},"canonical_sha256":"60344bd67fd9fb94817f8213aa33c72b6e761b8ce661618e09965f201376746d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"60344bd67fd9fb94817f8213aa33c72b6e761b8ce661618e09965f201376746d","first_computed_at":"2026-05-18T04:01:26.224253Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T04:01:26.224253Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"CtArCtLF4vxAipV+v4/7Zqhe9NAU1Ftn6+PWl4AHMP4zHo3Z2NHjkFYc7u5WBRuuemj3CwBPCJ2pu15QVO8VDw==","signature_status":"signed_v1","signed_at":"2026-05-18T04:01:26.224815Z","signed_message":"canonical_sha256_bytes"},"source_id":"1106.2756","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:af5c1371e5e4e05ddde5cf455622db20e3a0538c7ce2ce46fca6abdb0a7fa85b","sha256:7ff672b1ee77db903646b6e1cd1e77a9b4fe5c08d8235ff275247836e5b27842"],"state_sha256":"4fc2b0e7d956c47f83016fd8824af112b1c35229f6296c8894c7401e7bc8036f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"vCUpDiqImdOrw9WDfWjkv/sUxMNxSRS0yJYuZZrKpKZQqaVMTR53E8M/hdjYkYHXVs4ZHVlDCOEUAb51gV2ZDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T10:27:33.680833Z","bundle_sha256":"8a5994e08458d0256915279c27ed180676791649f791169a48b4c8c972dbf797"}}