Search

Showing total 355 results
355 results

Search Results

1. DMT of Parallel-Path and Layered Networks Under the Half-Duplex Constraint.

2. PIR Array Codes With Optimal Virtual Server Rate.

3. Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach.

4. The Wideband Slope of Interference Channels: The Small Bandwidth Case.

5. Ring Compute-and-Forward Over Block-Fading Channels.

6. Explicit Capacity Approaching Coding for Interactive Communication.

7. $\epsilon $ -Almost Selectors and Their Applications to Multiple-Access Communication.

8. Private Proximity Retrieval Codes.

9. Distributed Kalman Filtering Over Massive Data Sets: Analysis Through Large Deviations of Random Riccati Equations.

10. Quantum Versus Classical Simultaneity in Communication Complexity.

11. Convex-Split and Hypothesis Testing Approach to One-Shot Quantum Measurement Compression and Randomness Extraction.

12. Verifiably Multiplicative Secret Sharing.

13. Plausible Deniability Over Broadcast Channels.

14. Coded Cooperative Data Exchange in Multihop Networks.

15. Paving the Way for Consensus: Convergence of Block Gossip Algorithms.

16. Duality Between Source Coding With Quantum Side Information and Classical-Quantum Channel Coding.

17. Simple Coding Techniques for Many-Hop Relaying.

18. Local Hypothesis Testing Between a Pure Bipartite State and the White Noise State.

19. On the Combinatorial Version of the Slepian–Wolf Problem.

20. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints.

21. Ouroboros: An Efficient and Provably Secure KEM Family.

22. Private Information Retrieval in Graph-Based Replication Systems.

23. Quantum Reading Capacity: General Definition and Bounds.

24. The Informativeness of $k$ -Means for Learning Mixture Models.

25. Delay Asymptotics With Retransmissions and Incremental Redundancy Codes Over Erasure Channels.

26. Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications.

27. Incompressibility of Classical Distributions.

28. Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator.

29. Upper Bounds via Lamination on the Constrained Secrecy Capacity of Hypergraphical Sources.

30. Minimal Linear Codes in Odd Characteristic.

31. On Squares of Cyclic Codes.

32. Private Information Retrieval From Transversal Designs.

33. Optimal Uniform Secret Sharing.

34. The Conditional Common Information in Classical and Quantum Secret Key Distillation.

35. Expected Communication Cost of Distributed Quantum Tasks.

36. Guesswork With Quantum Side Information.

37. A Lower Bound on the Essential Interactive Capacity of Binary Memoryless Symmetric Channels.

38. Optimal Rates of Teaching and Learning Under Uncertainty.

39. Secret Key Agreement: General Capacity and Second-Order Asymptotics.

40. An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback.

41. Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access.

42. One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information.

43. Asymmetric Leaky Private Information Retrieval.

44. Low-Complexity Interactive Algorithms for Synchronization From Deletions, Insertions, and Substitutions.

45. Achievable Rate Region of the Bidirectional Buffer-Aided Relay Channel With Block Fading.

46. Communication Complexity of One-Shot Remote State Preparation.

47. Quantum Enhancement of Randomness Distribution.

48. A Generalized Quantum Slepian–Wolf.

49. Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography.

50. On the Communication Complexity of AND Functions.