Yasutada Oohama

According to our database1, Yasutada Oohama authored at least 96 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Universal Coding for Shannon Ciphers under Side-Channel Attacks.
CoRR, 2023

2022
A Family of Algorithms for Computing Information-Theoretic Forms of Strong Converse Exponents in Channel Coding and Lossy Source Coding.
CoRR, 2022

Strong Converse Theorem for Source Encryption under Side-Channel Attacks.
CoRR, 2022

Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources.
Proceedings of the IEEE International Symposium on Information Theory, 2022

A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels.
Entropy, 2021

Distributed Source Coding with Encryption Using Correlated Keys.
CoRR, 2021

Strong Converse for Distributed Source Coding with Encryption Using Correlated Keys.
Proceedings of the IEEE Information Theory Workshop, 2021

2020
A New Iterative Algorithm for Computing the Correct Decoding Probability Exponent of Discrete Memoryless Channels.
IEEE Trans. Inf. Theory, 2020

Performance Analysis of the Interval Algorithm for Random Number Generation in the Case of Markov Coin Tossing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Biometric Identification Systems With Noisy Enrollment for Gaussian Source.
Proceedings of the IEEE Information Theory Workshop, 2020

Exponent Function for the Gel'fand-Pinsker Channel at Rates above the Capacity.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Strong Converse for the State Dependent Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression.
IEEE Trans. Inf. Forensics Secur., 2019

Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Direct Link between Rényi-Tsallis Entropy and Hölder's Inequality - Yet Another Proof of Rényi-Tsallis Entropy Maximization.
Entropy, 2019

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks <sup>†</sup>.
Entropy, 2019

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks <sup>†</sup>.
Entropy, 2019

Exponential Strong Converse for One Helper Source Coding Problem.
Entropy, 2019

New Converse Bounds for Discrete Memoryless Channels in the Finite Blocklength Regime.
CoRR, 2019

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks.
CoRR, 2019

A New Inequality Related to Proofs of Strong Converse Theorems for Source or Channel Networks.
CoRR, 2019

Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks.
Proceedings of the Network and System Security - 13th International Conference, 2019

Capacity Results for Discrete Memoryless Channels in the Finite Blocklength Regime.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2019

An Inequality Useful for Proofs of Strong Converse Theorems in Network Information Theory.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
On a Relationship between the Correct Probability of Estimation from Correlated Data and Mutual Information.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Equivalence of Two Exponent Functions for Discrete Memoryless Channels with Input Cost at Rates above the Capacity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Exponential Strong Converse for Source Coding with Side Information at the Decoder.
Entropy, 2018

Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders.
CoRR, 2018

Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System.
CoRR, 2018

Post Encryption Compression with Affine Encoders for Secrecy Amplification in Distributed Source Encryption with Correlated Keys.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Exponent Function for Stationary Memoryless Channels with Input Cost at Rates above the Capacity.
CoRR, 2017

The Reliability Function for the Additive White Gaussian Noise Channel at Rates above the Capacity.
CoRR, 2017

Privacy amplification of distributed encrypted sources with correlated keys.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

The optimal exponent function for the additive white Gaussian noise channel at rates above the capacity.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
New Strong Converse for Asymmetric Broadcast Channels.
CoRR, 2016

Strong Converse Exponent for State Dependent Channels with Full State Information at the Sender and Partial State Information at the Receiver.
CoRR, 2016

Exponent Function for Source Coding with Side Information at the Decoder at Rates below the Rate Distortion Function.
CoRR, 2016

An Iterative Algorithm for Computing the Optimal Exponent of Correct Decoding Probability for Rates below the Rate Distortion Function.
CoRR, 2016

Strong converse for state dependent channels with full state information at the sender and partial state information at the receiver.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Exponent function for asymmetric broadcast channels at rates outside the capacity region.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Exponent function for Wyner-Ziv source coding problem at rates below the rate distortion function.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Computing the optimal exponent of correct decoding for discrete memoryless sources.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
The Optimal Use of Rate-Limited Randomness in Broadcast Channels With Confidential Messages.
IEEE Trans. Inf. Theory, 2015

On Two Strong Converse Theorems for Discrete Memoryless Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Gaussian CEO Problem in the Case of Scalar Source and Vector Observations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

A new iterative algorithm for computing the optimal exponent of correct decoding for discrete memoryless channels.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Strong converse theorems for degraded broadcast channels with feedback.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Exponent function for one helper source coding problem at rates outside the rate region.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Strong converse exponent for degraded broadcast channels at rates outside the capacity region.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Cognitive Interference Channels With Confidential Messages Under Randomness Constraint.
IEEE Trans. Inf. Theory, 2014

Indirect and Direct Gaussian Distributed Source Coding Problems.
IEEE Trans. Inf. Theory, 2014

Encoding of markov sources with partial memoryless side information at the decoder.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Rate distortion for source coding with Markov side information at the decoder.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

One helper source coding problem for a class of correlated sources with memory.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Converse Coding Theorems for Identification via Channels.
IEEE Trans. Inf. Theory, 2013

Outer Bound of the Capacity Region for Identification via Multiple Access Channels
CoRR, 2013

Converse coding theorems for identification via multiple access channels.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Distributed Source Coding of Correlated Gaussian Remote Sources.
IEEE Trans. Inf. Theory, 2012

Special issue on physical-layer security.
J. Commun. Networks, 2012

Privacy amplification theorem for bounded storage eavesdropper.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Broadcast channels with confidential messages by randomness constrained stochastic encoder.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Performance Analysis of the Interval Algorithm for Random Number Generation Based on Number Systems.
IEEE Trans. Inf. Theory, 2011

Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication.
IEEE Trans. Inf. Forensics Secur., 2011

Characterization of a part of the rate distortion region for the gaussian distributed source coding.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Gaussian Zig-Zag Source Coding Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Capacity Results for Relay Channels with Confidential Messages
CoRR, 2010

On Two Strong Converse Theorems for Stationary Discrete Memoryless Channels
CoRR, 2010

Distributed Source Coding of Correlated Gaussian Sources
CoRR, 2010

On the rate distortion region of Gaussian multiterminal source coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Distributed source coding of correlated memoryless Gaussian observations.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Distributed Source Coding for Correlated Memoryless Gaussian Sources
CoRR, 2009

Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation
CoRR, 2009

2008
Multiterminal source coding problem with several side informations at the decoder.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Rate distortion region for distributed source coding of correlated Gaussian remote sources.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Intrinsic Randomness Problem in the Framework of Slepian-Wolf Separate Coding System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Capacity Theorems for Relay Channels with Confidential Messages.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Relay Channels with Confidential Messages
CoRR, 2006

Gaussian Multiterminal Source Coding with Several Side Informations at the Decoder.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Rate-distortion theory for Gaussian multiterminal source coding systems with several side informations at the decoder.
IEEE Trans. Inf. Theory, 2005

Information-Spectrum Characterization of Multiple-Access Channels with Correlated Sources.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Information-Spectrum Characterization of Broadcast Channel with General Source.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Explicit expression of the interval algorithm for random number generation based on number systems.
Proceedings of the IEEE ITSOC Information Theory Workshop 2005 on Coding and Complexity, 2005

Multiterminal random number generation in of separate coding systems.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2003
Construction of a Piecewise Linear One-Dimensional Map Generating an Arbitrary Prescribed Tree Source.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2002
Statistical Properties of Chaotic Binary Sequences Generated by One-Dimensional Maps.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Converse coding theorem for the identification via multiple access channels.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

2001
Coding for relay channels with confidential messages.
Proceedings of the 2001 IEEE Information Theory Workshop, 2001

1998
The Rate-Distortion Function for the Quadratic Gaussian CEO Problem.
IEEE Trans. Inf. Theory, 1998

1997
Gaussian multiterminal source coding.
IEEE Trans. Inf. Theory, 1997

1996
Universal coding for correlated sources with linked encoders.
IEEE Trans. Inf. Theory, 1996

1994
Universal coding for the Slepian-Wolf data compression system and the strong converse theorem.
IEEE Trans. Inf. Theory, 1994


  Loading...