-
1
-
-
0011767018
-
"Statistical problems in quantum physics"
-
Berlin, Germany: Springer-Verlag
-
A. S. Holevo, "Statistical problems in quantum physics," in Proc. 2nd Japan-USSR Symp. Probability Theory (Lecture Notes in Mathematics). Berlin, Germany: Springer-Verlag, 1973, vol. 330, pp. 104-119.
-
(1973)
Proc. 2nd Japan-USSR Symp. Probability Theory (Lecture Notes in Mathematics)
, vol.330
, pp. 104-119
-
-
Holevo, A.S.1
-
2
-
-
4344699394
-
"Optimal randomizer efficiency in the bounded-storage model"
-
S. Dziembowski and U. Maurer, "Optimal randomizer efficiency in the bounded-storage model," J. Cryptol., vol. 17, no. 1, pp. 5-26, 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.1
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
3
-
-
35248849411
-
"On constructing locally computable extractors and cryptosystems in the bounded storage model"
-
S. Vadhan, "On constructing locally computable extractors and cryptosystems in the bounded storage model," in Advances in Cryptology - CRYPTO 2003, 2003, pp. 61-77.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, pp. 61-77
-
-
Vadhan, S.1
-
4
-
-
0032631760
-
"Dense quantum coding and a lower bound for 1-way quantum automata"
-
Atlanta, GA, May, quant-ph/9804043
-
A. Ambainis, A. Nayak, A. Ta-Shma, and U. Vazirani, "Dense quantum coding and a lower bound for 1-way quantum automata," in Proc. 31th ACM Symp. Theory of Computing, Atlanta, GA, May 1999, quant-ph/ 9804043, pp. 376-383.
-
(1999)
Proc. 31th ACM Symp. Theory of Computing
, pp. 376-383
-
-
Ambainis, A.1
Nayak, A.2
Ta-Shma, A.3
Vazirani, U.4
-
5
-
-
0032606505
-
"Optimal lower bounds for quantum automata and random access codes"
-
New York, Oct. quant-ph/9904093
-
A. Nayak, "Optimal lower bounds for quantum automata and random access codes," in Proc. 40th Annu. Symp. Foundations of Computer Science, New York, Oct. 1999, quant-ph/9904093, pp. 369-377.
-
(1999)
Proc. 40th Annu. Symp. Foundations of Computer Science
, pp. 369-377
-
-
Nayak, A.1
-
6
-
-
0036949108
-
"Privacy and interaction in quantum communication complexity and a theorem about the relative entropy of quantum states"
-
Vancouver, BC, Canada, Nov.
-
R. Jain, J. Radhakrishnan, and P. Sen, "Privacy and interaction in quantum communication complexity and a theorem about the relative entropy of quantum states," in Proc. 43rd Annu. IEEE Symp. Foundations of Computer Science (FOCS '02), Vancouver, BC, Canada, Nov. 2002, pp. 429-438.
-
(2002)
Proc. 43rd Annu. IEEE Symp. Foundations of Computer Science (FOCS '02)
, pp. 429-438
-
-
Jain, R.1
Radhakrishnan, J.2
Sen, P.3
-
7
-
-
0023985539
-
"Privacy amplification by public discussion"
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
8
-
-
0029405656
-
"Generalized privacy amplification"
-
Dec.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Dec. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
9
-
-
0030086632
-
"Randomness is linear in space"
-
N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comp. Syst. Sci., vol. 52, pp. 43-52, 1996.
-
(1996)
J. Comp. Syst. Sci.
, vol.52
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
10
-
-
19844376567
-
A Generic Security proof for Quantum Key Distribution
-
Online. Available
-
M. Christandl, R. Renner, and A. Ekert. (2004) A Generic Security Proof for Quantum Key Distribution. Online. Available: http://arxiv.org/abs/ quant-ph/0402131
-
(2004)
-
-
Christandl, M.1
Renner, R.2
Ekert, A.3
-
11
-
-
0003259517
-
"Quantum cryptography: Public-key distribution and coin tossing"
-
Bangalore, India, Dec.
-
C. H. Bennett and G. Brassard, "Quantum cryptography: Public-key distribution and coin tossing," in Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, Bangalore, India, Dec. 1984, pp. 175-179.
-
(1984)
Proc. IEEE Int. Conf. Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
12
-
-
3042730516
-
"Unconditional security in quantum cryptography"
-
D. Mayers, "Unconditional security in quantum cryptography," J. Assoc. Comput. Mach., vol. 48, no. 3, pp. 351-406, 2001.
-
(2001)
J. Assoc. Comput. Mach.
, vol.48
, Issue.3
, pp. 351-406
-
-
Mayers, D.1
-
13
-
-
23744481389
-
-
Online. Available
-
M. Ben-Or. (2002) Security of BB84 QKD Protocol. Online. Available: http://www.msri.org/publications/ln/msri/2002/quantumintro/ben-or/2/
-
(2002)
Security of Bb84 Qkd Protocol
-
-
Ben-Or, M.1
-
14
-
-
0032320435
-
"The quantum communication complexity of sampling"
-
Palo Alto, CA, Nov.
-
A. Ambainis, L. J. Schulman, A. Ta-Shma, U. Vazirani, and A. Wigderson, "The quantum communication complexity of sampling," in Proc. 39th Annu. Symp. Foundations of Computer Science, Palo Alto, CA, Nov. 1998, pp. 342-351.
-
(1998)
Proc. 39th Annu. Symp. Foundations of Computer Science
, pp. 342-351
-
-
Ambainis, A.1
Schulman, L.J.2
Ta-Shma, A.3
Vazirani, U.4
Wigderson, A.5
-
15
-
-
0018456171
-
"Universal classes of hash functions"
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comp. Sys. Sci., vol. 18, pp. 143-154, 1979.
-
(1979)
J. Comp. Sys. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
16
-
-
0019572642
-
"New hash functions and their use in authentication and set equality"
-
M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comp. Syst. Sci., vol. 22, pp. 265-279, 1981.
-
(1981)
J. Comp. Syst. Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
18
-
-
0003900151
-
"Distinguishability and accessible information in quantum theory"
-
Ph.D. dissertation, Univ. New Mexico, Albuquerque
-
C. A. Fuchs, "Distinguishability and accessible information in quantum theory," Ph.D. dissertation, Univ. New Mexico, Albuquerque, 1995.
-
(1995)
-
-
Fuchs, C.A.1
-
19
-
-
33646828627
-
"Three XOR-Lemmas - An Exposition"
-
Electronic Colloquium on Computational Complexity, Tech. Rep. TR95-056, Available: Online at at
-
O. Goldreich, "Three XOR-Lemmas - An Exposition," Electronic Colloquium on Computational Complexity, Tech. Rep. TR95-056, 1995. Available: Online at at http://eccc.uni-trier.de/eccc/.
-
(1995)
-
-
Goldreich, O.1
-
20
-
-
17744384340
-
"Improved Constructions for Extracting Quasi-Random Bits from Sources of Weak Randomness"
-
Master's thesis, Weizmann Inst. Sci., Available: Online at
-
A. Elbaz, "Improved Constructions for Extracting Quasi-Random Bits from Sources of Weak Randomness," Master's thesis, Weizmann Inst. Sci., 2003. Available: Online at http://wwwl.cs.columbia.edu/~arielbaz/.
-
(2003)
-
-
Elbaz, A.1
-
21
-
-
0017973511
-
"Broadcast channels with confidential messages"
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
22
-
-
0027599802
-
"Secret key agreement by public discussion from common information"
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
24
-
-
0002128111
-
"A fast algorithm for proving terminating hypergeometric series identities"
-
D. Zeilberger, "A fast algorithm for proving terminating hypergeometric series identities," Discr. Math., vol. 80, pp. 207-211, 1990.
-
(1990)
Discr. Math.
, vol.80
, pp. 207-211
-
-
Zeilberger, D.1
|