A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J, vol.54, issue.8, pp.1355-1387, 1975.
DOI : 10.1002/j.1538-7305.1975.tb02040.x

S. Leung-yan-cheong and M. Hellman, The Gaussian wire-tap channel, IEEE Trans. Inf. Theory, vol.24, issue.4, pp.451-456, 1978.
DOI : 10.1109/tit.1978.1055917

A. Laourine and A. B. Wagner, The degraded Poisson wiretap channel, IEEE Trans. Inf. Theory, vol.58, issue.12, pp.7073-7085, 2012.
DOI : 10.1109/tit.2012.2217191

URL : http://arxiv.org/pdf/1004.0269

O. Ozel, E. Ekrem, and S. Ulukus, Gaussian wiretap channel with amplitude and variance constraints, IEEE Trans. Inf. Theory, vol.61, issue.10, pp.5553-5563, 2015.

J. G. Smith, The information capacity of amplitude-and varianceconstrained scalar Gaussian channels, Info. Control, vol.18, issue.3, pp.203-219, 1971.

A. Dytso, M. Goldenbaum, H. V. Poor, and S. Shamai, When are discrete channel inputs optimal?-Optimization techniques and some new results, Proc. 52nd Annu. Conf. Inf. Sci. Syst. (CISS), 2018.

F. Oggier and B. Hassibi, A perspective on the MIMO wiretap channel, Proc. of IEEE, vol.103, pp.1874-1882, 2015.

Y. Liang, H. V. Poor, and S. Shamai, Information theoretic security, Foundations and Trends in Communications and Information Theory, vol.5, issue.4-5, pp.355-580, 2009.

H. V. Poor and R. F. Schaefer, Wireless physical layer security, Proc. the Natl. Acad. Sci. U.S.A, vol.114, issue.1, pp.19-26, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01341108

S. Verdú, The exponential distribution in information theory, Problemy Peredachi Informatsii, vol.32, issue.1, pp.100-111, 1996.

A. Dytso, M. Egan, M. S. Perlaza, H. V. Poor, and S. Shamai, On the capacity of non-Gaussian wiretap channels and extremal inequalities, 2018.

R. M. Dudley, Real Analysis and Probability, vol.74, 2002.

D. G. Luenberger, Optimization by Vector Space Methods, 1997.

T. Liu and P. Viswanath, An extremal inequality motivated by multiterminal information-theoretic problems, IEEE Trans. Inf. Theory, vol.53, issue.5, pp.1839-1851, 2007.

J. Fahs and I. Abou-faycal, A Cauchy input achieves the capacity of a Cauchy channel under a logarithmic constraint, Proc. IEEE Int. Symp. Inf. Theory, pp.3077-3081, 2014.

R. Bustin, R. Liu, H. V. Poor, and S. Shamai, Shitz), "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel, EURASIP J. Wireless Commun. and Netw, issue.1, p.370970, 2009.