Himanshu Tyagi
Himanshu Tyagi
Indian Institute of Science
Verified email at iisc.ac.in
Title
Cited by
Cited by
Year
The complexity of estimating Rényi entropy
J Acharya, A Orlitsky, AT Suresh, H Tyagi
Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete …, 2014
702014
Common information and secret key capacity
H Tyagi
IEEE Transactions on Information Theory 59 (9), 5627-5640, 2013
652013
Estimating Renyi Entropy of Discrete Distributions
J Acharya, A Orlitsky, AT Suresh, H Tyagi
IEEE Transactions on Information Theory 63 (1), 38-56, 2017
632017
Inference under information constraints I: Lower bounds from chi-square contraction
J Acharya, CL Canonne, H Tyagi
IEEE Transactions on Information Theory 66 (12), 7835-7855, 2020
602020
Secret key agreement: General capacity and second-order asymptotics
M Hayashi, H Tyagi, S Watanabe
IEEE Transactions on Information Theory 62 (7), 3796-3810, 2016
542016
Converses for secret key agreement and secure computing
H Tyagi, S Watanabe
IEEE Transactions on Information Theory 61 (9), 4809-4827, 2015
542015
When is a function securely computable?
H Tyagi, P Narayan, P Gupta
IEEE Transactions on Information Theory 57 (10), 6337-6350, 2011
542011
A simple criterion on degree sequences of graphs
A Tripathi, H Tyagi
Discrete Applied Mathematics 156 (18), 3513-3517, 2008
492008
A bound for multiparty secret key agreement and implications for a problem of secure computing
H Tyagi, S Watanabe
Annual International Conference on the Theory and Applications of …, 2014
462014
Test without trust: Optimal locally private distribution testing
J Acharya, C Canonne, C Freitag, H Tyagi
The 22nd International Conference on Artificial Intelligence and Statistics …, 2019
442019
Optimal lossless source codes for timely updates
P Mayekar, P Parag, H Tyagi
2018 IEEE International Symposium on Information Theory (ISIT), 1246-1250, 2018
332018
Universal hashing for information-theoretic security
H Tyagi, A Vardy
Proceedings of the IEEE 103 (10), 1781-1795, 2015
322015
Explicit capacity-achieving coding scheme for the Gaussian wiretap channel
H Tyagi, A Vardy
2014 IEEE International Symposium on Information Theory, 956-960, 2014
322014
Multiterminal secrecy by public discussion
P Narayan, H Tyagi
Now Publishers, 2016
262016
Strong converse for a degraded wiretap channel via active hypothesis testing
M Hayashi, H Tyagi, S Watanabe
2014 52nd Annual Allerton Conference on Communication, Control, and …, 2014
242014
Strong converse using change of measure arguments
H Tyagi, S Watanabe
IEEE Transactions on Information Theory 66 (2), 689-703, 2019
222019
Distributed simulation and distributed inference
J Acharya, CL Canonne, H Tyagi
arXiv preprint arXiv:1804.06952, 2018
222018
Inference under information constraints II: Communication constraints and shared randomness
J Acharya, CL Canonne, H Tyagi
IEEE Transactions on Information Theory 66 (12), 7856-7877, 2020
202020
The Gelfand-Pinsker channel: Strong converse and upper bound for the reliability function
H Tyagi, P Narayan
2009 IEEE International Symposium on Information Theory, 1954-1957, 2009
202009
RATQ: A universal fixed-length quantizer for stochastic optimization
P Mayekar, H Tyagi
International Conference on Artificial Intelligence and Statistics, 1399-1409, 2020
172020
The system can't perform the operation now. Try again later.
Articles 1–20