Communities
Connect sessions
AI calendar
Organizations
Join Slack
Contact Sales
Search
Open menu
Home
Papers
0904.0308
Cited By
v1
v2
v3
v4
v5 (latest)
Exponential decreasing rate of leaked information in universal random privacy amplification
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2009
2 April 2009
Masahito Hayashi
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Exponential decreasing rate of leaked information in universal random privacy amplification"
40 / 40 papers shown
Rényi divergence-based uniformity guarantees for
k
k
k
-universal hash functions
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2024
Madhura Pathegama
Alexander Barg
169
1
0
21 Oct 2024
Security for adversarial wiretap channels
Esther Hänggi
Iyán Méndez Veiga
Ligong Wang
203
1
0
02 Apr 2024
Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost Constraints
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2023
Masahito Hayashi
Yanling Chen
119
2
0
21 Oct 2023
One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys
Physical Review Applied (Phys. Rev. Appl.), 2023
Bing-Hong Li
Yuan-Mei Xie
Xiao-Yu Cao
Chen-Long Li
Yao Fu
Hua‐Lei Yin
Zenghu Chen
373
28
0
03 Jan 2023
Strong Converse for Privacy Amplification against Quantum Side Information
International Symposium on Information Theory (ISIT), 2022
Yunyi Shen
Li Gao
Hao-Chung Cheng
319
12
0
21 Feb 2022
Conditional Shannon, Réyni, and Tsallis entropies estimation and asymptotic limits: discrete case
Ba Amadou Diadie
Lo Gane Samb
118
0
0
16 Feb 2020
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack
IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2019
Masahito Hayashi
Á. Vázquez-Castro
127
20
0
31 Dec 2019
Toward Undetectable Quantum Key Distribution over Bosonic Channels
IEEE Journal on Selected Areas in Information Theory (JSAIT), 2019
Mehrdad Tahmasbi
Matthieu R. Bloch
224
11
0
28 Apr 2019
Entropies and their Asymptotic Theory in the discrete case
Amadou Diadié Ba
G. Lo
167
1
0
19 Mar 2019
Secure list decoding
Masahito Hayashi
275
1
0
09 Jan 2019
Semi-Finite Length Analysis for Information Theoretic Tasks
Masahito Hayashi
186
5
0
01 Nov 2018
Simulation of Random Variables under Rényi Divergence Measures of All Orders
Lei Yu
Vincent Y. F. Tan
332
15
0
31 May 2018
Asymptotic Coupling and Its Applications in Information Theory
Lei Yu
Vincent Y. F. Tan
274
17
0
19 Dec 2017
Rényi Resolvability and Its Applications to the Wiretap Channel
Lei Yu
Vincent Y. F. Tan
347
47
0
04 Jul 2017
Information-theoretic Physical Layer Security for Satellite Channels
M. Vázquez-Castro
Masahito Hayashi
222
9
0
24 Oct 2016
Analysis of Remaining Uncertainties and Exponents under Various Conditional Rényi Entropies
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2016
Vincent Y. F. Tan
Masahito Hayashi
153
16
0
31 May 2016
Finite-Block-Length Analysis in Classical and Quantum Information Theory
Masahito Hayashi
263
9
0
10 May 2016
On an almost-universal hash function family with applications to authentication and secrecy codes
IACR Cryptology ePrint Archive (IACR ePrint), 2015
Khodakhast Bibak
B. M. Kapron
Venkatesh Srinivasan
L. Tóth
253
18
0
08 Jul 2015
Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2015
Masahito Hayashi
Vincent Y. F. Tan
334
36
0
10 Apr 2015
Uniform Random Number Generation from Markov Chains: Non-Asymptotic and Asymptotic Analyses
Masahito Hayashi
Shun Watanabe
368
38
0
15 Mar 2015
Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels
Allerton Conference on Communication, Control, and Computing (Allerton), 2014
Vincent Y. F. Tan
Matthieu R. Bloch
158
15
0
26 Jun 2014
Secret Sharing Schemes Based on Min-Entropies
Mitsugu Iwamoto
Junji Shikata
184
7
0
23 Jan 2014
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2013
Masahito Hayashi
T. Tsurumaru
823
97
0
21 Nov 2013
Security analysis of epsilon-almost dual universal2 hash functions: smoothing of min entropy vs. smoothing of Rényi entropy of order 2
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2013
Masahito Hayashi
474
33
0
06 Sep 2013
Reliability and Secrecy Functions of the Wiretap Channel under Cost Constraint
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2013
T. Han
H. Endo
M. Sasaki
952
59
0
02 Jul 2013
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf-Spectral Entropy
Shun Watanabe
Masahito Hayashi
249
41
0
22 Nov 2012
Attacks on quantum key distribution protocols that employ non-ITS authentication
Quantum Information Processing (QIP), 2012
C. Pacher
Aysajan Abidin
T. Lorünser
M. Peev
R. Ursin
A. Zeilinger
Jan-Åke Larsson
352
34
0
03 Sep 2012
Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage
IEEE Journal on Selected Areas in Communications (JSAC), 2012
Tzu-Han Chou
S. Draper
A. Sayeed
152
22
0
18 Aug 2012
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
Allerton Conference on Communication, Control, and Computing (Allerton), 2012
Masahito Hayashi
R. Matsumoto
622
105
0
07 Feb 2012
Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker
Communications in Mathematical Physics (CMP), 2012
Masahito Hayashi
597
36
0
03 Feb 2012
Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked information
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2012
Masahito Hayashi
467
50
0
01 Feb 2012
Large deviation analysis for quantum security via smoothing of Renyi entropy of order 2
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2012
Masahito Hayashi
764
48
0
01 Feb 2012
Universal Secure Multiplex Network Coding with Dependent and Non-Uniform Messages
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2011
R. Matsumoto
Masahito Hayashi
413
23
0
17 Nov 2011
The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy Exponents
IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2011
Tzu-Han Chou
Vincent Y. F. Tan
S. Draper
404
14
0
21 Jul 2011
Universally Attainable Error and Information Exponents, and Equivocation Rate for the Broadcast Channels with Confidential Messages
Masahito Hayashi
R. Matsumoto
402
14
0
21 Apr 2011
Secure Multiplex Network Coding
R. Matsumoto
Masahito Hayashi
498
26
0
15 Feb 2011
Secure Multiplex Coding with a Common Message
R. Matsumoto
Masahito Hayashi
355
7
0
20 Jan 2011
Tight exponential analysis of universally composable privacy amplification and its applications
Masahito Hayashi
723
79
0
07 Oct 2010
Strong security and separated code constructions for the broadcast channels with confidential messages
R. Matsumoto
Masahito Hayashi
417
8
0
05 Oct 2010
Construction of wiretap codes from ordinary channel codes
Masahito Hayashi
R. Matsumoto
428
53
0
08 Jan 2010
1
Page 1 of 1