ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1411.0735
  4. Cited By
Secret Key Agreement: General Capacity and Second-Order Asymptotics
v1v2v3 (latest)

Secret Key Agreement: General Capacity and Second-Order Asymptotics

3 November 2014
Masahito Hayashi
Himanshu Tyagi
Shun Watanabe
ArXiv (abs)PDFHTML

Papers citing "Secret Key Agreement: General Capacity and Second-Order Asymptotics"

4 / 4 papers shown
Title
Wiretap Secret Key Capacity of Tree-PIN
Wiretap Secret Key Capacity of Tree-PIN
A. Poostindouz
Reihaneh Safavi-Naini
28
5
0
14 Mar 2019
Equivocations, Exponents and Second-Order Coding Rates under Various
  Rényi Information Measures
Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures
Masahito Hayashi
Vincent Y. F. Tan
68
30
0
10 Apr 2015
Information Spectrum Approach to Strong Converse Theorems for Degraded
  Wiretap Channels
Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels
Vincent Y. F. Tan
Matthieu R. Bloch
51
15
0
26 Jun 2014
Converses for Secret Key Agreement and Secure Computing
Converses for Secret Key Agreement and Secure Computing
Himanshu Tyagi
Shun Watanabe
107
68
0
23 Apr 2014
1