{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:13:23Z","timestamp":1729642403990,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6874929","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T17:50:30Z","timestamp":1408470630000},"page":"731-735","source":"Crossref","is-referenced-by-count":0,"title":["A duality relation connecting different quantum generalizations of the conditional R&amp;#x00E9;nyi entropy"],"prefix":"10.1109","author":[{"given":"Marco","family":"Tomamichel","sequence":"first","affiliation":[]},{"given":"Mario","family":"Berta","sequence":"additional","affiliation":[]},{"given":"Masahito","family":"Hayashi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security Analysis of Epsilon-Almost Dual Two-Universal Hash Functions","year":"2013","author":"hayashi","key":"19"},{"journal-title":"Smooth Entropies-A Tutorial with Focus on Applications in Cryptography","year":"2012","author":"tomamichel","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2110950"},{"key":"36","doi-asserted-by":"crossref","first-page":"5840","DOI":"10.1109\/TIT.2009.2032797","article-title":"A fully quantum asymptotic equipartition property","volume":"55","author":"tomamichel","year":"2009","journal-title":"IEEE Trans Inf Theory"},{"journal-title":"Large Deviation Analysis for Quantum Security via Smoothing of Renyi Entropy of Order","year":"2012","author":"hayashi","key":"18"},{"key":"33","first-page":"547","article-title":"On measures of information and entropy","author":"renyi","year":"1961","journal-title":"Proc Symp Math Stat Probab"},{"journal-title":"Multiplicativity of Completely Bounded P-Norms Implies a Strong Converse for Entanglement-Assisted Capacity","year":"2013","author":"gupta","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.110.080501"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1928.tb01236.x"},{"key":"39","first-page":"377","article-title":"Finite blocklength bounds for multiple access channels with correlated sources","author":"yagi","year":"2012","journal-title":"Proc IEEE ISITA"},{"journal-title":"Monotonicity of a Relative Renyi Entropy","year":"2013","author":"frank","key":"13"},{"key":"14","article-title":"Source coding with side information and universal coding","volume":"21","author":"gallager","year":"1979","journal-title":"Proc IEEE ISIT"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158473"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/18.370121"},{"journal-title":"Strong Converse for the Classical Capacity of Entanglement-Breaking and Hadamard Channels","year":"2013","author":"wilde","key":"38"},{"journal-title":"A Limit of the Quantum Renyi Divergence","year":"2013","author":"datta","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1142\/S0129055X11004412"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2278971"},{"journal-title":"Information Theoretic Security for Encryption Based on Conditional Renyi Entropies","year":"2013","author":"iwamoto","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025545"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27056-6_16"},{"journal-title":"Renyi Divergences and the Classical Capacity of Finite Compound Channels","year":"2013","author":"mosonyi","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2110050"},{"journal-title":"Quantum Hypothesis Testing and the Operational Interpretation of the Quantum Renyi Relative Entropies","year":"2013","author":"mosonyi","key":"27"},{"journal-title":"Quantum Relative Renyi Entropies","year":"2013","author":"muller-lennert","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1063\/1.4838856"},{"key":"3","first-page":"78","article-title":"On the araki-lieb-thirring inequality","volume":"4","author":"audenaert","year":"2008","journal-title":"Int J Inf Syst Sci"},{"key":"2","first-page":"41","article-title":"Information measures and capacity of order alpha for discrete memoryless channels","volume":"16","author":"arimoto","year":"1975","journal-title":"Colloq Math Soc J Bolyai"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0653-8","article-title":"Matrix analysis","author":"bhatia","year":"1997","journal-title":"Graduate Texts in Mathematics"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01045887"},{"journal-title":"The Converse Part of The Theorem for Quantum Hoeffding Bound","year":"2006","author":"nagaoka","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"journal-title":"Quantum Renyi Divergence Satisfies Data Processing Inequality","year":"2013","author":"beigi","key":"6"},{"journal-title":"Security of quantum key distribution","year":"2005","author":"renner","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1063\/1.1459754"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.828155"},{"journal-title":"?-Z-relative Renyi Entropies","year":"2013","author":"audenaert","key":"4"},{"key":"9","first-page":"5","author":"berta","year":"2013","journal-title":"An equality between entanglement and uncertainty"},{"journal-title":"Single-shot quantum state merging","year":"2008","author":"berta","key":"8"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06874929.pdf?arnumber=6874929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:23:17Z","timestamp":1602674597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6874929"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6874929","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}