Oral Presentations (International, Refereed)
  1. M. Hayashi, “A linear programming approach to attainable Cramer-Rao type bound,” in Quantum Communication, Computing, and Measurement, Plenum Publishing, (1997), pp.99-108.

  2. F. Sakaguchi and M. Hayashi, “A relationship between continuous wavelet transformation and the algebra su(1,1),” Proceedings of the IASTED International Conference on Signal Processing and Communications(SPC 2002), Marbella, Spain, (2000), pp.390-394.

  3. M. Hayashi, “Optimal sequence of POVMs in the sense of Stein's lemma in quantum hypothesis testing,” ERATO workshop on Quantum Information Science 2001(EQIS2001), Tokyo, (2001), p.20.

  4. M. Hayashi and K. Matsumoto, “Quantum universal variable-length source coding,” ERATO Workshop on Quantum Information Science 2002 (EQIS2002), Tokyo, (2002), pp.31-32.

  5. F. Morikoshi, M. Hayashi, M. Koashi, K. Matsumoto, and A. Winter, “Error exponents for entanglement concentration,” ERATO Workshop on Quantum Information Science 2002(EQIS2002), Tokyo, (2002), pp.46-47.

  6. M. Hayashi and H. Nagaoka, “A general formula for the classical capacity of a general quantum channel,” Proceedings of the International Symposium on Information Theory 2002(ISIT2002), Lausanne, Switzerland, (2002), p.71.

  7. M. Hayashi and K. Matsumoto, “Simple construction of quantum universal variable-length source coding,” Proceedings of the International Symposium on Information Theory 2003(ISIT2003), Yokohama, (2003), p.459.

  8. M. Hayashi, “General asymptotic formulas for fixed-length quantum entanglement concentration,” Proceedings of the International Symposium on Information Theory 2003(ISIT2003), Yokohama, (2003), p.431.

  9. T. Ogawa and M. Hayashi, “On error exponents in quantum hypothesis testing,” Proceedings of the International Symposium on Information Theory 2003(ISIT2003), Yokohama, (2003), p.479.

  10. K. Matsumoto and M. Hayashi, “Universal distortion-free entanglement concentration,” Proceedings of the International Symposium on Information Theory 2004 (ISIT2004), Chicago, (2004), p.323.

  11. M. Hayashi, “General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity,” International Symposium on Information Theory and its Applications (ISITA 2004), Parma, Italy, (2004), p. 1562-1567.

  12. M. Hayashi, “Exponents of channel resolvability and wire-tapped channel,” International Symposium on Information Theory and its Applications(ISITA 2004), Parma, Italy, (2004), p. 1080-1085.

  13. T. Hiroshima and M. Hayashi, “Finding a maximally correlated state -- Simultaneous Schmidt decomposition of bipartite pure states,” ERATO conference on Quantum Information Science 2004(EQIS'04), Tokyo, (2004), pp. 43-44.

  14. M. Hayashi, H. Imai, K. Matsumoto, M. B. Ruskai and T. Shimono, “Qubit channels which require four inputs to achieve capacity: Implications for additivity conjectures,” ERATO conference on Quantum Information Science 2004(EQIS'04), Tokyo, (2004), pp. 45-46.

  15. M. Hayashi, “Estimation of SU(2) action by using entanglement,” ERATO conference on Quantum Information Science 2004(EQIS'04), Tokyo, (2004), pp. 68-69.

  16. Y. Tsuda, M. Hayashi and K. Matsumoto, “Hypothesis testing for entanglement,” ERATO conference on Quantum Information Science 2004 (EQIS'04), Tokyo, (2004), pp. 70-71.

  17. M. Owari and M. Hayashi, “The relationship between local copying and local discrimination,” ERATO conference on Quantum Information Science 2005 (EQIS 05), JST, Tokyo, (2005), pp. 31-32.

  18. D. Markham, S. Virmani, M. Owari, M. Murao, M. Hayashi, “Local Discrimination and multipartite entanglement measures,” ERATO conference on Quantum Information Science 2005 (EQIS 05), JST, Tokyo, (2005), pp. 91-92.

  19. T. Tsuda, B.S. Shi, A. Tomita, M. Hayashi, K. Matsumoto, and Y.K. Jiang, “Hypothesis testing for an entangled state produced by spontaneous parametric down conversion,” ERATO conference on Quantum Information Science 2005 (EQIS 05), JST, Tokyo, (2005), pp. 57-58.

  20. M. Hayashi, K. Iwama, H. Nishimura, R. Raymond, and S. Yamashita, “Quantum Network Coding,” QIP 2006 - The 9th Workshop on Quantum Information Processing, Paris, (2006).

  21. M. Hayashi, K. Iwama, H. Nishimura, R. Raymond, and S. Yamashita, “(4,1)-Quantum Random Access Coding Does Not Exist,” ISIT 2006, the 2006 IEEE International Symposium on Information Theory, Seattle, Washington, (2006), p. 446-450.

  22. M. Hayashi, “Practical Evaluation of Security for Quantum Key Distribution,” Asian conference on Quantum Information Science 2006 (AQIS 06), BeiJing Friendship Hotel, BeiJing, China, September 1-4, (2006), p. 9-10.

  23. M. Hayashi, K. Iwama, H. Nishimura, R. Raymond, and S. Yamashita, “Quantum Network Coding,” 24th International Symposium on Theoretical Aspects of Computer Science (STACS 2007) Aachen, Germany; 22-24 February 2007: W. Thomas and P. Weil (Eds.), Lecture Notes in Computer Science, vol 4393, Springer Berlin,pp. 610-621, (2007); DOI: 10.1007/978-3-540-70918-3_52

  24. M. Hayashi, “Theoretical analysis and implementation on QKD with the decoy-state method,” Theory and Realisation of Practical Quantum Key Distribution University of Waterloo, June 11 - 14, 2007

  25. F. Buscemi, M. Hayashi, and M. Horodecki, “A general entropic approach to the information-disturbance tradeoff problem in quantum measurements,” Third Asia Pacific Conference on Quantum Information Science, Nanyang Executive Center, Singapore, August (2007).

  26. M. Hayashi, D. Markham, M. Murao, M. Owari, and S. Virmani, “Entanglement and group symmetries: stabilizer, symmetric and anti-symmetric states,” Asian Conference on Quantum Information Science Shiran Kaikan, Kyoto University, Japan September 3 - 6, (2007), p. 24-25.

  27. M. Hayashi, “Prior entanglement between senders enables perfect quantum network coding,” Asian Conference on Quantum Information Science Shiran Kaikan, Kyoto University, Japan September 3 - 6, (2007), p.38-39.

  28. F. Buscemi, M. Hayashi, and M. Horodecki, “A general entropic approach to the information-disturbance tradeoff problem in quantum measurements,” Asian Conference on Quantum Information Science Shiran Kaikan, Kyoto University, Japan September 3 - 6, (2007), p.40-41

  29. M. Hayashi, “General theory for decoy-state QKD with arbitrary number of intensities,” Asian Conference on Quantum Information Science Shiran Kaikan, Kyoto University, Japan September 3 - 6, (2007), p.75-76

  30. J. Hasegawa, M. Hayashi, T. Hiroshima, and A. Tomita, “Security analysis and experiment of decoy state quantum key distribution incorporating finite statistics,” Asian Conference on Quantum Information Science Shiran Kaikan, Kyoto University, Japan September 3 - 6, (2007), p.77-78

  31. F. Buscemi, M. Hayashi, and M. Horodecki, “INFORMATION EXTRACTION VERSUS IRREVERSIBILITY IN QUANTUM MEASUREMENT PROCESSES,” Noise Information & Complexity @ Quantum Scale, Ettore Majorana Centre, Erice (Sicily), Italy, 4th - 10th November (2007). : International Journal of Quantum Information (IJQI), 6, Supplementary Issue 1(2008)pp. 613-619 ; DOI: 10.1142/S0219749908003852)

  32. M. Hayashi and R. Matsumoto, “Construction of wiretap codes from ordinary channel codes,” Proceedings of the International Symposium on Information Theory 2010 (ISIT2010), Austin, (2010) , p2538-2542

  33. D. Akimoto, M. Hayashi, “Pure state identification with multi-copy states,” First Graduate Student Congress on Quantum Information and Computation, Centre for Quantum Technologies, Singapore, 6th - 12th December, (2010).

  34. Matsumoto, Ryutaroh, Hayashi, Masahito, "Secure Multiplex Network Coding" Proceedings of 2011 International Symposium on Network Coding (NetCod),Beijing, China, 25-27 July 2011, DOI: 10.1109/ISNETCOD.2011.5979076.

  35. Matsumoto, Ryutaroh, Hayashi, Masahito, "Secure Multiplex Coding with a Common Message", Proceedings of 2011 IEEE International Symposium on Information Theory (ISIT 2011), Saint-Petersburg, Russia , July, 31 - August, 5, 2011, pp1965-1969

  36. Toyohiro Tsurumaru and Masahito Hayashi, “Dual universality of hash functions and its applications to classical and quantum cryptography” QCRYPT 2011: First Annual Conference on Quantum Cryptography, Zurich, Switzerland, Sept 12–16, 2011.

  37. Masahito Hayashi, Ryutaroh Matsumoto, "Universally Attainable Error and Information Exponents, and Equivocation Rate for the Broadcast Channels with Confidential Messages," Proceedings of Forty-Ninth Annual Allerton Conference, University of Illinois at Urbana-Champaign, IL, USA, Sept 28 – 30, 2011, pp. 439 - 444. DOI: 10.1109/Allerton.2011.6120200
  38. Masahito Hayashi, "Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker," Proceedings of IEEE International Symposium on Information Theory Proceedings (ISIT), 2012, Cambridge, MA, USA, July, 1-6, 2012, pp. 890 - 894. DOI: 10.1109/ISIT.2012.6284690
  39. Masahito Hayashi, "Quantum wiretap channel with non-uniform random number and its exponent of leaked information," Proceedings of IEEE International Symposium on Information Theory Proceedings (ISIT), 2012, Cambridge, MA, USA, July, 1-6, 2012, pp. 895 - 899. DOI: 10.1109/ISIT.2012.6284691
  40. Masahito Hayashi, Ryutaroh Matsumoto, "Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages," Proceedings of 2012 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton Retreat Center, Monticello, Illinois, USA, October 1 – 5, 2012, p. 954.
  41. Masaki Owari, Masahito Hayashi, "Asymptotic local hypothesis testing between a pure bipartite state," The 2nd Institute of Mathematical Statistics Asia Pacific Rim Meeting, Epochal Tsukuba, Tsukuba, Japan July 2 – 4, 2012.
  42. Wataru Kumagai, Masahito Hayashi, "Quantum hypothesis testing for quantum Gaussian states," The 2nd Institute of Mathematical Statistics Asia Pacific Rim Meeting, Epochal Tsukuba, Tsukuba, Japan July 2 – 4, 2012.
  43. Wataru Kumagai, Masahito Hayashi, "Irreversibility of Entanglement Concentration for Pure State," 12th Asian Quantum Information Science conference (AQIS12), School of Physical Science and Technology, Soochow University, Suzhou, China, August 23-26, (2012).
  44. M. Tomamichel and M. Hayashi, “A hierarchy of information quantities for the finite block length analysis of quantum tasks,” The 15th workshop on Quantum Information Processing (QIP 2013), Beijing, China, 21–25, January, 2013.
  45. Wataru Kumagai, Masahito Hayashi, “Quantum hypothesis testing for quantum Gaussian states,” Bernoulli Society Satellite Meeting to the ISI World Statistics Congress 2013, The University of Tokyo, Tokyo, Japan, September 2–4, 2013.
  46. Wataru Kumagai, Masahito Hayashi, “Second Order Asymptotics for Random Number Generation,” 2013 IEEE International Symposium on Information Theory (ISIT 2013), Istanbul, Turkey, 7–12, July, 2013, pp. 1506-1510.
  47. S. Watanabe, M. Hayashi, “Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf-Spectral Entropy,” 2013 IEEE International Symposium on Information Theory (ISIT 2013), Istanbul, Turkey, 7–12, July, 2013, pp. 2715-2719.
  48. M. Hayashi, S. Watanabe, “Non-Asymptotic Bounds on Fixed Length Source Coding for Markov Chains,” 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton House, Monticello, Illinois, USA, 2–4, October, 2013.
  49. M. Hayashi and S. Watanabe, “Non-Asymptotic Analysis of Privacy Amplification for Markov Chains,” The 7th International Conference on Information Theoretic Security (ICITS 2013), Singapore, 28–30, November, 2013.
  50. Kosuke Ito, Wataru Kumagai, Masahito Hayashi, “Asymptotic Reversibility of LOCC Conversions,” IEEE International Symposium on Information Theory (ISIT2014), Honolulu, HI, USA, June 29 - July 4, 2014. pp.531
  51. Marco Tomamichel, Mario Berta, Masahito Hayashi, “A Duality Relation Connecting Different Quantum Generalizations of the Conditional Rényi Entropy,” IEEE International Symposium on Information Theory (ISIT2014), Honolulu, HI, USA, June 29 - July 4, 2014. pp.731
  52. M. Hayashi and S. Watanabe, “Information Geometry Approach to Parameter Estimation in Markov Chains,” IEEE International Symposium on Information Theory (ISIT2014), Honolulu, HI, USA, June 29 - July 4, 2014. pp.1091
  53. Masahito Hayashi, Himanshu Tyagi, Shun Watanabe “Secret key agreement: general capacity and second-order asymptotics,” IEEE International Symposium on Information Theory (ISIT2014), Honolulu, HI, USA, June 29 - July 4, 2014. pp.1136
  54. Vincent Y. F. Tan, Shun Watanabe, Masahito Hayashi, “Moderate Deviations for Joint Source-Channel Coding of Systems With Markovian Memory,” IEEE International Symposium on Information Theory (ISIT2014), Honolulu, HI, USA, June 29 - July 4, 2014. pp.1687
  55. S. Watanabe and M. Hayashi, “Strong Converse and Second-Order Asymptotics of Channel Resolvability,” IEEE International Symposium on Information Theory (ISIT2014), Honolulu, HI, USA, June 29 - July 4, 2014. pp.1882
  56. Wataru Kumagai, Masahito Hayashi, “Random Number Conversion via Restricted Storage,” IEEE International Symposium on Information Theory (ISIT2014), Honolulu, HI, USA, June 29 - July 4, 2014. pp.2047
  57. Kosuke Ito, Wataru Kumagai, Masahito Hayashi, “Asymptotic Entanglement Preservability of LOCC Conversions,” 14th Asian Quantum Information Science Conference (AQIS2014), Shirankaikan, Kyoto, Japan, 20 - 24, August, 2014. pp.85-86
  58. M. Hayashi, H. Tyagi, and S. Watanabe, “Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing,” 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, Illinois, USA, 30 September - 3 October, 2014. pp.148–151
  59. M. Hayashi, "Universal Channel Coding with Continuous Output System," 2014 International Symposium on Information Theory and Its Applications, Melbourne, Australia, 26 - 29, October 2014. pp. 21-25
  60. S. Watanabe, M. Hayashi, "Finite-length Analysis on Tail Probability and Simple Hypothesis Testing for Markov Chain," 2014 International Symposium on Information Theory and Its Applications, Melbourne, Australia, 26 - 29, October 2014. pp.196-200
  61. Masahito Hayashi, "Estimation of group action with energy constraint," The 17th workshop on Quantum Information Processing (QIP 2015), Sydney, NSW, Australia, 12-16, January, 2015.
  62. Masahito Hayashi, Vincent Tan, “Erasure and Undetected Error Probabilities in the Moderate Deviations Regime,” IEEE International Symposium on Information Theory (ISIT2015), Hong Kong, June 14 - June 19, 2015. pp. 1821-1825
  63. Masahito Hayashi, Vincent Tan, “Equivocations and Exponents under Various Rényi Information Measures,” IEEE International Symposium on Information Theory (ISIT2015), Hong Kong, June 14 - June 19, 2015. pp. 281-285
  64. Masahito Hayashi, Toyohiro Tsurumaru, “More Efficient Privacy Amplification with Less Random Seeds,” IEEE International Symposium on Information Theory (ISIT2015), Hong Kong, June 14 - June 19, 2015. pp. 1786-1790
  65. Masahito Hayashi, Marco Tomamichel, “Correlation Detection and an Operational Interpretation of the Rényi Mutual Information,” IEEE International Symposium on Information Theory (ISIT2015), Hong Kong, June 14 - June 19, 2015. pp. 1447-1451
  66. Masahito Hayashi, Mwari Owari, “Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state,” IEEE International Symposium on Information Theory (ISIT2015), Hong Kong, June 14 - June 19, 2015. pp. 691-695
  67. Masahito Hayashi, Vincent Y. F. Tan, “Remaining uncertainties and exponents under Rényi information measures,” IEEE International Symposium on Information Theory (ISIT2016), Barcelona, 10-15 July 2016. pp. 1536-1540
  68. Marco Tomamichel, Masahito Hayashi, “Operational interpretation of Rényi conditional mutual information via composite hypothesis testing against Markov distributions,” IEEE International Symposium on Information Theory (ISIT2016), Barcelona, 10-15 July 2016. pp. 585-589
  69. Yuxiang Yang, Giulio Chiribella, and Masahito Hayashi, “Optimal compression for identically prepared qubit states,” The 20th workshop on Quantum Information Processing (QIP 2017), Washington, Seattle, USA, 16-20, January, 2017.
  70. Angeles Vazquez Castro and Masahito Hayashi, “Physical Layer Security for Satellite Channels,” 2017 IEEE Aerospace Conference, Montana, USA, 4 - 11, March, 2017.
  71. Kosuke Ito and Masahito Hayashi, “Optimal performance of generalized heat engines with finite-size baths of arbitrary multiple conserved quantities based on non-i.i.d. scaling,” The Fifth Quantum Thermodynamics Conference , Oxford, UK 13-17 March 2017.
  72. M. Hayashi and V. Tan, “Minimum Rates of Approximate Sufficient Statistics,” IEEE International Symposium on Information Theory (ISIT2017), Aachen, Germany, June, 25 -- 30, 2017. pp. 3045-3049
  73. M. Hayashi, M. Owari, G. Kato, and N. Cai, “Secrecy and Robustness for Active Attack in Secure Network Coding,” IEEE International Symposium on Information Theory (ISIT2017), Aachen, Germany, June, 25 -- 30, 2017. pp. 1172-1177
  74. M. Hayashi, “Secure wireless communication under spatial and local Gaussian noise assumptions,” IEEE International Symposium on Information Theory (ISIT2017), Aachen, Germany, June, 25 -- 30, 2017. pp. 1698-1703
  75. R. Yaguchi and M. Hayashi, “Second Order Analysis for Joint Source-Channel Coding with Markovian Source,” IEEE International Symposium on Information Theory (ISIT2017), Aachen, Germany, June, 25 -- 30, 2017. pp. 918-923
  76. Y. Yang, G. Bai, G. Chiribella, and M. Hayashi, “Compression for quantum population coding,” IEEE International Symposium on Information Theory (ISIT2017), Aachen, Germany, June, 25 -- 30, 2017. pp. 1973-1978
  77. K. Fujii and M. Hayashi, “Verifiable fault-tolerance in measurement-based quantum computation,” Asian Conference on Quantum Information Science (AQIS 17), National University of Singapore, Singapore, September 4 - 8, 2017.
  78. Y. Yang, G. Bai, G. Chiribella, and M. Hayashi, “Compression for Quantum Population Coding,” Asian Conference on Quantum Information Science (AQIS 17), National University of Singapore, Singapore, September 4 - 8, 2017.
  79. G. Kato, M. Owari, and M. Hayashi, “Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free Public Communication,” 10th International Conference on Information Theoretic Security (ICITS2017) Conference Track, Hong Kong, China, November 29 -- December 2, 2017. Accepted for presentation.
  80. M. Hayashi, “Secure wireless communication under spatial and local Gaussian noise assumptions,” 10th International Conference on Information Theoretic Security (ICITS2017) Workshop Track, Hong Kong, China, November 29 -- December 2, 2017. Accepted for presentation.
  81. M. Hayashi, M. Owari, G. Kato, and N. Cai, “ Secrecy and Robustness for Active Attack in Secure Network Coding and its Application to Network Quantum Key Distribution,” 10th International Conference on Information Theoretic Security (ICITS2017) Workshop Track, Hong Kong, China, November 29 -- December 2, 2017. Accepted for presentation.
  82. A. Vazquez-Castro and M. Hayashi, “Information-theoretic Physical Layer Security for Satellite Channels,” 10th International Conference on Information Theoretic Security (ICITS2017) Workshop Track, Hong Kong, China, November 29 -- December 2, 2017. Accepted for presentation.
  83. Y. Yang, G. Bai, G. Chiribella, and M. Hayashi, “Compression for identically prepared qudit states,” Quantum Information Processsing (QIP 2018), Accepted for presentation.

HAYASHI Masahito