Yasutada Oohama
Orcid: 0009-0003-3272-3860
According to our database1,
Yasutada Oohama
authored at least 99 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Source Coding for Markov Sources With Partial Memoryless Side Information at the Decoder.
IEEE J. Sel. Areas Inf. Theory, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
2022
A Family of Algorithms for Computing Information-Theoretic Forms of Strong Converse Exponents in Channel Coding and Lossy Source Coding.
CoRR, 2022
A Framework for Distributed Source Coding with Encryption: a New Strong Converse and More.
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources.
Proceedings of the IEEE International Symposium on Information Theory, 2022
A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More.
Proceedings of the IEEE International Symposium on Information Theory, 2022
2021
Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels.
Entropy, 2021
Proceedings of the IEEE Information Theory Workshop, 2021
2020
A New Iterative Algorithm for Computing the Correct Decoding Probability Exponent of Discrete Memoryless Channels.
IEEE Trans. Inf. Theory, 2020
Performance Analysis of the Interval Algorithm for Random Number Generation in the Case of Markov Coin Tossing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Proceedings of the IEEE Information Theory Workshop, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
2019
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression.
IEEE Trans. Inf. Forensics Secur., 2019
A Direct Link between Rényi-Tsallis Entropy and Hölder's Inequality - Yet Another Proof of Rényi-Tsallis Entropy Maximization.
Entropy, 2019
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks <sup>†</sup>.
Entropy, 2019
Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks <sup>†</sup>.
Entropy, 2019
New Converse Bounds for Discrete Memoryless Channels in the Finite Blocklength Regime.
CoRR, 2019
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks.
CoRR, 2019
A New Inequality Related to Proofs of Strong Converse Theorems for Source or Channel Networks.
CoRR, 2019
Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
An Inequality Useful for Proofs of Strong Converse Theorems in Network Information Theory.
Proceedings of the IEEE International Symposium on Information Theory, 2019
2018
On a Relationship between the Correct Probability of Estimation from Correlated Data and Mutual Information.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Equivalence of Two Exponent Functions for Discrete Memoryless Channels with Input Cost at Rates above the Capacity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Entropy, 2018
Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders.
CoRR, 2018
Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System.
CoRR, 2018
Post Encryption Compression with Affine Encoders for Secrecy Amplification in Distributed Source Encryption with Correlated Keys.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
Exponent Function for Stationary Memoryless Channels with Input Cost at Rates above the Capacity.
CoRR, 2017
The Reliability Function for the Additive White Gaussian Noise Channel at Rates above the Capacity.
CoRR, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
The optimal exponent function for the additive white Gaussian noise channel at rates above the capacity.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
Strong Converse Exponent for State Dependent Channels with Full State Information at the Sender and Partial State Information at the Receiver.
CoRR, 2016
Exponent Function for Source Coding with Side Information at the Decoder at Rates below the Rate Distortion Function.
CoRR, 2016
An Iterative Algorithm for Computing the Optimal Exponent of Correct Decoding Probability for Rates below the Rate Distortion Function.
CoRR, 2016
Strong converse for state dependent channels with full state information at the sender and partial state information at the receiver.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016
Exponent function for asymmetric broadcast channels at rates outside the capacity region.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Exponent function for Wyner-Ziv source coding problem at rates below the rate distortion function.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
The Optimal Use of Rate-Limited Randomness in Broadcast Channels With Confidential Messages.
IEEE Trans. Inf. Theory, 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
A new iterative algorithm for computing the optimal exponent of correct decoding for discrete memoryless channels.
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Exponent function for one helper source coding problem at rates outside the rate region.
Proceedings of the IEEE International Symposium on Information Theory, 2015
Strong converse exponent for degraded broadcast channels at rates outside the capacity region.
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
Cognitive Interference Channels With Confidential Messages Under Randomness Constraint.
IEEE Trans. Inf. Theory, 2014
IEEE Trans. Inf. Theory, 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
2013
IEEE Trans. Inf. Theory, 2013
CoRR, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
2012
IEEE Trans. Inf. Theory, 2012
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
Broadcast channels with confidential messages by randomness constrained stochastic encoder.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
2011
Performance Analysis of the Interval Algorithm for Random Number Generation Based on Number Systems.
IEEE Trans. Inf. Theory, 2011
Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication.
IEEE Trans. Inf. Forensics Secur., 2011
Characterization of a part of the rate distortion region for the gaussian distributed source coding.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
2010
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
CoRR, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
2009
Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation
CoRR, 2009
2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Rate distortion region for distributed source coding of correlated Gaussian remote sources.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
2007
Intrinsic Randomness Problem in the Framework of Slepian-Wolf Separate Coding System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2005
Rate-distortion theory for Gaussian multiterminal source coding systems with several side informations at the decoder.
IEEE Trans. Inf. Theory, 2005
Information-Spectrum Characterization of Multiple-Access Channels with Correlated Sources.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Explicit expression of the interval algorithm for random number generation based on number systems.
Proceedings of the IEEE ITSOC Information Theory Workshop 2005 on Coding and Complexity, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2003
Construction of a Piecewise Linear One-Dimensional Map Generating an Arbitrary Prescribed Tree Source.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
Statistical Properties of Chaotic Binary Sequences Generated by One-Dimensional Maps.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
2001
Proceedings of the 2001 IEEE Information Theory Workshop, 2001
1998
IEEE Trans. Inf. Theory, 1998
1997
1996
IEEE Trans. Inf. Theory, 1996
1994
Universal coding for the Slepian-Wolf data compression system and the strong converse theorem.
IEEE Trans. Inf. Theory, 1994