Follow
Shun Watanabe
Title
Cited by
Cited by
Year
Secret key agreement from vector Gaussian sources by rate limited public communication
S Watanabe, Y Oohama
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on …, 2010
772010
Nonasymptotic and second-order achievability bounds for coding with side-information
S Watanabe, S Kuzuoka, VYF Tan
IEEE Transactions on Information Theory 61 (4), 1574-1605, 2015
632015
Converses for secret key agreement and secure computing
H Tyagi, S Watanabe
IEEE Transactions on Information Theory 61 (9), 4809-4827, 2015
572015
Tomography increases key rates of quantum-key-distribution protocols
S Watanabe, R Matsumoto, T Uyematsu
Physical Review A 78 (4), 042316, 2008
562008
Key rate of quantum key distribution with hashed two-way classical communication
S Watanabe, R Matsumoto, T Uyematsu, Y Kawano
Physical Review A 76 (3), 032312, 2007
542007
Secret key agreement: General capacity and second-order asymptotics
M Hayashi, H Tyagi, S Watanabe
IEEE Transactions on Information Theory 62 (7), 3796-3810, 2016
532016
A bound for multiparty secret key agreement and implications for a problem of secure computing
H Tyagi, S Watanabe
Annual International Conference on the Theory and Applications of …, 2014
462014
Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy
S Watanabe, M Hayashi
2013 IEEE International Symposium on Information Theory, 2715-2719, 2013
432013
Information geometry approach to parameter estimation in Markov chains
M Hayashi, S Watanabe
2014 IEEE International Symposium on Information Theory, 1091-1095, 2014
402014
Secret key agreement from correlated Gaussian sources by rate limited public communication
S Watanabe, Y Oohama
Arxiv preprint arXiv:1001.3705, 2010
402010
Private and quantum capacities of more capable and less noisy quantum channels
S Watanabe
Physical Review A 85 (1), 012326, 2012
352012
Finite-length analysis on tail probability for Markov chain and application to simple hypothesis testing
S Watanabe, M Hayashi
The Annals of Applied Probability 27 (2), 811-845, 2017
322017
Secret key agreement by soft-decision of signals in gaussian maurer's model
M Naito, S Watanabe, R Matsumoto, T Uyematsu
Arxiv preprint arXiv:0804.2940, 2008
28*2008
Uniform random number generation from Markov chains: Non-asymptotic and asymptotic analyses
M Hayashi, S Watanabe
IEEE Transactions on Information Theory 62 (4), 1795-1822, 2016
272016
Noise tolerance of the BB84 protocol with random privacy amplification
S Watanabe, R Matsumoto, R Uyematsu
Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on …, 2005
272005
Strong converse using change of measure arguments
H Tyagi, S Watanabe
IEEE Transactions on Information Theory 66 (2), 689-703, 2019
262019
Neyman–Pearson test for zero-rate multiterminal hypothesis testing
S Watanabe
IEEE Transactions on Information Theory 64 (7), 4923-4939, 2017
262017
Second-order region for Gray–Wyner network
S Watanabe
IEEE Transactions on Information Theory 63 (2), 1006-1018, 2016
262016
Strongly secure privacy amplification cannot be obtained by encoder of Slepian-Wolf code
S Watanabe, T Saitou, R Matsumoto, T Uyematsu
Information Theory, 2009. ISIT 2009. IEEE International Symposium on, 1298-1302, 2009
262009
Strong converse for a degraded wiretap channel via active hypothesis testing
M Hayashi, H Tyagi, S Watanabe
2014 52nd Annual Allerton Conference on Communication, Control, and …, 2014
252014
The system can't perform the operation now. Try again later.
Articles 1–20