-
1
-
-
0032320435
-
The quantum communication complexity of sampling
-
A. Ambainis, L. J. Schulman, A. Ta-Shma, U. Vazirani, and A. Wigderson. The quantum communication complexity of sampling. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science, pages 342-351, 1998.
-
(1998)
Proceedings of the 39th Annual Symposium on Foundations of Computer Science
, pp. 342-351
-
-
Ambainis, A.1
Schulman, L.J.2
Ta-Shma, A.3
Vazirani, U.4
Wigderson, A.5
-
3
-
-
33645596744
-
-
M. Ben-Or, M. Horodecki, D. Leung, D. Mayers, and J. Oppenheim. Composability of QKD. Slides available at http://www.msri.org/ publications/ln/msri/2002/qip/mayers/1/ (Part II), 2002.
-
(2002)
Composability of QKD
-
-
Ben-Or, M.1
Horodecki, M.2
Leung, D.3
Mayers, D.4
Oppenheim, J.5
-
4
-
-
40849125403
-
The universal composable security of quantum key distribution
-
M. Ben-Or, M. Horodecki, D. Leung, D. Mayers, and J. Oppenheim. The universal composable security of quantum key distribution. In Proceedings of TCC 2005, 2005.
-
(2005)
Proceedings of TCC 2005
-
-
Ben-Or, M.1
Horodecki, M.2
Leung, D.3
Mayers, D.4
Oppenheim, J.5
-
7
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. H. Bennett. Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21):3121-3124, 1992.
-
(1992)
Physical Review Letters
, vol.68
, Issue.21
, pp. 3121-3124
-
-
Bennett, C.H.1
-
9
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer. Generalized privacy amplification. IEEE Transaction on Information Theory, 41(6):1915-1923, 1995.
-
(1995)
IEEE Transaction on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
10
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
16
-
-
1642370829
-
Locking classical correlation in quantum states
-
D. DiVincenzo, M. Horodecki, D. Leung, J. Smolin, and B. Terhal. Locking classical correlation in quantum states. Physical Review Letters, 92, 067902, 2004.
-
(2004)
Physical Review Letters
, vol.92
, pp. 067902
-
-
DiVincenzo, D.1
Horodecki, M.2
Leung, D.3
Smolin, J.4
Terhal, B.5
-
17
-
-
4344699394
-
Optimal randomizer efficiency in the bounded-storage model
-
Conference version appeared in Proc. of STOC'02
-
S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5-26, 2004. Conference version appeared in Proc. of STOC'02.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
18
-
-
0037319628
-
Proof of security of quantum key distribution with two-way classical communications
-
D. Gottesman and H.-K. Lo. Proof of security of quantum key distribution with two-way classical communications. IEEE Transactions on Information Theory, 49(2):457-475, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 457-475
-
-
Gottesman, D.1
Lo, H.-K.2
-
19
-
-
5644232846
-
Randomizing quantum states: Constructions and applications
-
P. Hayden, D. Leung, P. W. Shor, and A. Winter. Randomizing quantum states: Constructions and applications Communications in Mathematical Physics, 250(2):371-391, 2004.
-
(2004)
Communications in Mathematical Physics
, vol.250
, Issue.2
, pp. 371-391
-
-
Hayden, P.1
Leung, D.2
Shor, P.W.3
Winter, A.4
-
24
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer. Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory, 39(3):733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
31
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|