ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1010.1358
  4. Cited By
Tight exponential analysis of universally composable privacy
  amplification and its applications
v1v2v3v4v5 (latest)

Tight exponential analysis of universally composable privacy amplification and its applications

7 October 2010
Masahito Hayashi
ArXiv (abs)PDFHTML

Papers citing "Tight exponential analysis of universally composable privacy amplification and its applications"

13 / 13 papers shown
Title
Short Blocklength Wiretap Channel Codes via Deep Learning: Design and
  Performance Evaluation
Short Blocklength Wiretap Channel Codes via Deep Learning: Design and Performance Evaluation
Vidhi Rana
Rémi A. Chou
65
15
0
07 Jun 2022
Strong Converse for Privacy Amplification against Quantum Side
  Information
Strong Converse for Privacy Amplification against Quantum Side Information
Yunyi Shen
Li Gao
Hao-Chung Cheng
45
10
0
21 Feb 2022
Wiretap Secret Key Capacity of Tree-PIN
Wiretap Secret Key Capacity of Tree-PIN
A. Poostindouz
Reihaneh Safavi-Naini
16
5
0
14 Mar 2019
Semi-Finite Length Analysis for Information Theoretic Tasks
Semi-Finite Length Analysis for Information Theoretic Tasks
Masahito Hayashi
19
5
0
01 Nov 2018
Equivocations, Exponents and Second-Order Coding Rates under Various
  Rényi Information Measures
Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures
Masahito Hayashi
Vincent Y. F. Tan
66
30
0
10 Apr 2015
Uniform Random Number Generation from Markov Chains: Non-Asymptotic and
  Asymptotic Analyses
Uniform Random Number Generation from Markov Chains: Non-Asymptotic and Asymptotic Analyses
Masahito Hayashi
Shun Watanabe
74
37
0
15 Mar 2015
More Efficient Privacy Amplification with Less Random Seeds via Dual
  Universal Hash Function
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function
Masahito Hayashi
T. Tsurumaru
91
91
0
21 Nov 2013
Security analysis of epsilon-almost dual universal2 hash functions:
  smoothing of min entropy vs. smoothing of Rényi entropy of order 2
Security analysis of epsilon-almost dual universal2 hash functions: smoothing of min entropy vs. smoothing of Rényi entropy of order 2
Masahito Hayashi
126
33
0
06 Sep 2013
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and
  Inf-Spectral Entropy
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf-Spectral Entropy
Shun Watanabe
Masahito Hayashi
78
40
0
22 Nov 2012
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
Masahito Hayashi
R. Matsumoto
126
102
0
07 Feb 2012
Precise evaluation of leaked information with universal2 privacy
  amplification in the presence of quantum attacker
Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker
Masahito Hayashi
120
32
0
03 Feb 2012
Quantum wiretap channel with non-uniform random number and its exponent
  and equivocation rate of leaked information
Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked information
Masahito Hayashi
110
47
0
01 Feb 2012
Large deviation analysis for quantum security via smoothing of Renyi
  entropy of order 2
Large deviation analysis for quantum security via smoothing of Renyi entropy of order 2
Masahito Hayashi
153
45
0
01 Feb 2012
1