ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1202.1332
  4. Cited By
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
v1v2v3v4v5v6 (latest)

Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages

Allerton Conference on Communication, Control, and Computing (Allerton), 2012
7 February 2012
Masahito Hayashi
R. Matsumoto
ArXiv (abs)PDFHTML

Papers citing "Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages"

10 / 10 papers shown
Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost
  Constraints
Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost ConstraintsIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2023
Masahito Hayashi
Yanling Chen
113
2
0
21 Oct 2023
Absolute Security in High-Frequency Wireless Links
Absolute Security in High-Frequency Wireless LinksIEEE Conference on Communications and Network Security (IEEE CNS), 2022
Alejandro Cohen
Rafael G. L. DÓliveira
Chia-Yi Yeh
H. Guerboukha
R. Shrestha
Z. Fang
E. Knightly
Muriel Médard
D. Mittleman
158
8
0
11 Aug 2022
Message Randomization and Strong Security in Quantum Stabilizer-Based
  Secret Sharing for Classical Secrets
Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets
R. Matsumoto
202
2
0
25 Apr 2019
Rényi Resolvability and Its Applications to the Wiretap Channel
Rényi Resolvability and Its Applications to the Wiretap Channel
Lei Yu
Vincent Y. F. Tan
345
47
0
04 Jul 2017
Secure uniform random number extraction via incoherent strategies
Secure uniform random number extraction via incoherent strategies
Masahito Hayashi
Huangjun Zhu
144
18
0
13 Jun 2017
Information-theoretic Physical Layer Security for Satellite Channels
Information-theoretic Physical Layer Security for Satellite Channels
M. Vázquez-Castro
Masahito Hayashi
219
9
0
24 Oct 2016
Finite-Block-Length Analysis in Classical and Quantum Information Theory
Finite-Block-Length Analysis in Classical and Quantum Information Theory
Masahito Hayashi
254
9
0
10 May 2016
More Efficient Privacy Amplification with Less Random Seeds via Dual
  Universal Hash Function
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash FunctionIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2013
Masahito Hayashi
T. Tsurumaru
806
97
0
21 Nov 2013
Security analysis of epsilon-almost dual universal2 hash functions:
  smoothing of min entropy vs. smoothing of Rényi entropy of order 2
Security analysis of epsilon-almost dual universal2 hash functions: smoothing of min entropy vs. smoothing of Rényi entropy of order 2IEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2013
Masahito Hayashi
466
33
0
06 Sep 2013
Quantum wiretap channel with non-uniform random number and its exponent
  and equivocation rate of leaked information
Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked informationIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2012
Masahito Hayashi
457
50
0
01 Feb 2012
1
Page 1 of 1