ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1404.5715
  4. Cited By
Converses for Secret Key Agreement and Secure Computing
v1v2v3 (latest)

Converses for Secret Key Agreement and Secure Computing

23 April 2014
Himanshu Tyagi
Shun Watanabe
ArXiv (abs)PDFHTML

Papers citing "Converses for Secret Key Agreement and Secure Computing"

9 / 9 papers shown
Title
Function Computation Under Privacy, Secrecy, Distortion, and
  Communication Constraints
Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints
Onur Gunlu
84
5
0
11 Jan 2022
Secure Multi-Function Computation with Private Remote Sources
Secure Multi-Function Computation with Private Remote Sources
Onur Gunlu
Matthieu R. Bloch
Rafael F. Schaefer
66
12
0
17 Jun 2021
Multi-factor Physical Layer Security Authentication in Short Blocklength
  Communication
Multi-factor Physical Layer Security Authentication in Short Blocklength Communication
Miroslav Mitev
Mahdi Shakiba-Herfeh
A. Chorti
M. Reed
68
20
0
27 Oct 2020
Biometric and Physical Identifiers with Correlated Noise for
  Controllable Private Authentication
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
Onur Gunlu
Rafael F. Schaefer
H. Vincent Poor
63
15
0
03 Jan 2020
Wiretap Secret Key Capacity of Tree-PIN
Wiretap Secret Key Capacity of Tree-PIN
A. Poostindouz
Reihaneh Safavi-Naini
18
5
0
14 Mar 2019
Communication Complexity of Estimating Correlations
Communication Complexity of Estimating Correlations
U. Hadar
Jingbo Liu
Yury Polyanskiy
O. Shayevitz
73
23
0
25 Jan 2019
Controllable Identifier Measurements for Private Authentication with
  Secret Keys
Controllable Identifier Measurements for Private Authentication with Secret Keys
Onur Gunlu
Kittipong Kittichokechai
Rafael F. Schaefer
Giuseppe Caire
51
28
0
04 Apr 2018
Secret Key Agreement: General Capacity and Second-Order Asymptotics
Secret Key Agreement: General Capacity and Second-Order Asymptotics
Masahito Hayashi
Himanshu Tyagi
Shun Watanabe
48
61
0
03 Nov 2014
Information Spectrum Approach to Strong Converse Theorems for Degraded
  Wiretap Channels
Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels
Vincent Y. F. Tan
Matthieu R. Bloch
42
15
0
26 Jun 2014
1