Shun Watanabe
TitleCited byYear
Secret key agreement from vector Gaussian sources by rate limited public communication
S Watanabe, Y Oohama
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on …, 2010
602010
Nonasymptotic and second-order achievability bounds for coding with side-information
S Watanabe, S Kuzuoka, VYF Tan
IEEE Transactions on Information Theory 61 (4), 1574-1605, 2015
502015
Tomography increases key rates of quantum-key-distribution protocols
S Watanabe, R Matsumoto, T Uyematsu
Physical Review A 78 (4), 042316, 2008
422008
Secret key agreement: General capacity and second-order asymptotics
M Hayashi, H Tyagi, S Watanabe
IEEE Transactions on Information Theory 62 (7), 3796-3810, 2016
402016
Key rate of quantum key distribution with hashed two-way classical communication
S Watanabe, R Matsumoto, T Uyematsu, Y Kawano
Physical Review A 76 (3), 032312, 2007
392007
Converses for secret key agreement and secure computing
H Tyagi, S Watanabe
IEEE Transactions on Information Theory 61 (9), 4809-4827, 2015
372015
A bound for multiparty secret key agreement and implications for a problem of secure computing
H Tyagi, S Watanabe
Annual International Conference on the Theory and Applications of …, 2014
372014
Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy
S Watanabe, M Hayashi
2013 IEEE International Symposium on Information Theory, 2715-2719, 2013
342013
Secret key agreement from correlated Gaussian sources by rate limited public communication
S Watanabe, Y Oohama
Arxiv preprint arXiv:1001.3705, 2010
322010
Information geometry approach to parameter estimation in Markov chains
M Hayashi, S Watanabe
2014 IEEE International Symposium on Information Theory, 1091-1095, 2014
252014
Noise tolerance of the BB84 protocol with random privacy amplification
S Watanabe, R Matsumoto, R Uyematsu
Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on …, 2005
242005
Strongly secure privacy amplification cannot be obtained by encoder of Slepian-Wolf code
S Watanabe, T Saitou, R Matsumoto, T Uyematsu
Information Theory, 2009. ISIT 2009. IEEE International Symposium on, 1298-1302, 2009
232009
Secret key agreement by soft-decision of signals in gaussian maurer's model
M Naito, S Watanabe, R Matsumoto, T Uyematsu
Arxiv preprint arXiv:0804.2940, 2008
23*2008
Finite-length analysis on tail probability for Markov chain and application to simple hypothesis testing
S Watanabe, M Hayashi
The Annals of Applied Probability 27 (2), 811-845, 2017
222017
Second-order region for Gray–Wyner network
S Watanabe
IEEE Transactions on Information Theory 63 (2), 1006-1018, 2016
222016
Uniform random number generation from Markov chains: Non-asymptotic and asymptotic analyses
M Hayashi, S Watanabe
IEEE Transactions on Information Theory 62 (4), 1795-1822, 2016
202016
The optimal use of rate-limited randomness in broadcast channels with confidential messages
S Watanabe, Y Oohama
IEEE Transactions on Information Theory 61 (2), 983-995, 2014
20*2014
Strong converse for a degraded wiretap channel via active hypothesis testing
M Hayashi, H Tyagi, S Watanabe
2014 52nd Annual Allerton Conference on Communication, Control, and …, 2014
202014
Strong converse and second-order asymptotics of channel resolvability
S Watanabe, M Hayashi
2014 IEEE International Symposium on Information Theory, 1882-1886, 2014
202014
Non-asymptotic and asymptotic analyses on Markov chains in several problems
M Hayashi, S Watanabe
2014 Information Theory and Applications Workshop (ITA), 1-10, 2014
172014
The system can't perform the operation now. Try again later.
Articles 1–20