Follow
Himanshu Tyagi
Himanshu Tyagi
Indian Institute of Science
Verified email at iisc.ac.in
Title
Cited by
Cited by
Year
Inference under information constraints I: Lower bounds from chi-square contraction
J Acharya, CL Canonne, H Tyagi
IEEE Transactions on Information Theory 66 (12), 7835-7855, 2020
1122020
Estimating Renyi Entropy of Discrete Distributions
J Acharya, A Orlitsky, AT Suresh, H Tyagi
IEEE Transactions on Information Theory 63 (1), 38-56, 2017
832017
The complexity of estimating Rényi entropy
J Acharya, A Orlitsky, AT Suresh, H Tyagi
Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete …, 2014
822014
Common information and secret key capacity
H Tyagi
IEEE Transactions on Information Theory 59 (9), 5627-5640, 2013
712013
Converses for secret key agreement and secure computing
H Tyagi, S Watanabe
IEEE Transactions on Information Theory 61 (9), 4809-4827, 2015
692015
Test without trust: Optimal locally private distribution testing
J Acharya, C Canonne, C Freitag, H Tyagi
The 22nd International Conference on Artificial Intelligence and Statistics …, 2019
662019
When is a function securely computable?
H Tyagi, P Narayan, P Gupta
IEEE Transactions on Information Theory 57 (10), 6337-6350, 2011
652011
Secret key agreement: General capacity and second-order asymptotics
M Hayashi, H Tyagi, S Watanabe
IEEE Transactions on Information Theory 62 (7), 3796-3810, 2016
602016
Inference under information constraints II: Communication constraints and shared randomness
J Acharya, CL Canonne, H Tyagi
IEEE Transactions on Information Theory 66 (12), 7856-7877, 2020
592020
A simple criterion on degree sequences of graphs
A Tripathi, H Tyagi
Discrete Applied Mathematics 156 (18), 3513-3517, 2008
582008
A bound for multiparty secret key agreement and implications for a problem of secure computing
H Tyagi, S Watanabe
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
502014
Universal hashing for information-theoretic security
H Tyagi, A Vardy
Proceedings of the IEEE 103 (10), 1781-1795, 2015
462015
Interactive inference under information constraints
J Acharya, CL Canonne, Y Liu, Z Sun, H Tyagi
IEEE Transactions on Information Theory 68 (1), 502-516, 2021
432021
RATQ: A universal fixed-length quantizer for stochastic optimization
P Mayekar, H Tyagi
International Conference on Artificial Intelligence and Statistics, 1399-1409, 2020
432020
Optimal lossless source codes for timely updates
P Mayekar, P Parag, H Tyagi
2018 IEEE International Symposium on Information Theory (ISIT), 1246-1250, 2018
432018
Strong converse using change of measure arguments
H Tyagi, S Watanabe
IEEE Transactions on Information Theory 66 (2), 689-703, 2019
422019
Multiterminal secrecy by public discussion
P Narayan, H Tyagi
Foundations and Trends® in Communications and Information Theory 13 (2-3 …, 2016
402016
Explicit capacity-achieving coding scheme for the Gaussian wiretap channel
H Tyagi, A Vardy
2014 IEEE International Symposium on Information Theory, 956-960, 2014
382014
Inference under information constraints III: Local privacy constraints
J Acharya, CL Canonne, C Freitag, Z Sun, H Tyagi
IEEE Journal on Selected Areas in Information Theory 2 (1), 253-267, 2021
352021
Optimal source codes for timely updates
P Mayekar, P Parag, H Tyagi
IEEE Transactions on Information Theory 66 (6), 3714-3731, 2020
342020
The system can't perform the operation now. Try again later.
Articles 1–20