Author of the publication

Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution.

, and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Mechanism for Randomized Responses under Universally Composable Security Measure., , and . ISIT, page 547-551. IEEE, (2019)Asymptotically Decoupling and Mixing Properties in Quantum System., and . ISIT, page 261-265. IEEE, (2018)Universally attainable error and information exponents, and equivocation rate for the broadcast channels with confidential messages., and . Allerton, page 439-444. IEEE, (2011)Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication., , and . CoRR, (2020)Reverse em-problem based on Bregman divergence and its application to classical and quantum information theory.. CoRR, (2024)Updating Quantum Cryptography Report ver. 1., , , , , , , , , and 17 other author(s). CoRR, (2009)Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures., and . CoRR, (2015)Information Geometry Approach to Parameter Estimation in Hidden Markov Models.. CoRR, (2017)Construction and Analysis of an Artificial Neuronal Network using a Neuron-collecting, Micro-patterning Method based on a Multi-electrode Array System., , , , , and . IJCCI (NCTA), page 304-307. SciTePress, (2011)More efficient privacy amplification with less random seeds., and . ISIT, page 1786-1790. IEEE, (2015)