-
1
-
-
34547688445
-
Complexity issues in coding theory
-
(ISSN 1433-8092, 4th Year, 46th Report)
-
BARG, A. 1997. Complexity issues in coding theory. Electronic Colloquium on Computational Complexity Report TR97-046 (ISSN 1433-8092, 4th Year, 46th Report), ftp://ftp.eccc.uni-trier.de/pub/eccc/reports/1997/TR97-046/index.html.
-
(1997)
Electronic Colloquium on Computational Complexity Report
, vol.TR97-046
-
-
Barg, A.1
-
2
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
May 25, 1992
-
BENNETT, C. H. 1992. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 21, May 25, 1992, 3121-2124.
-
(1992)
Phys. Rev. Lett.
, vol.68
, Issue.21
, pp. 3121-12124
-
-
Bennett, C.H.1
-
3
-
-
0026626314
-
Experimental quantum cryptography
-
BENNETT, C. H., BESSETTE, G., BRASSARD, G., SALVAIL, L., AND SMOLIN, J. 1992. Experimental quantum cryptography. J. Crypt. 5, 1, 3-28.
-
(1992)
J. Crypt.
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, G.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
4
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
(Bangalore, India, Dec.). IEEE Computer Society Press, Los Alamitos, Calif.
-
BENNETT, C. H., AND BRASSARD, G. 1984. Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (Bangalore, India, Dec.). IEEE Computer Society Press, Los Alamitos, Calif., pp. 175-179.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
5
-
-
84969361843
-
In practical quantum oblivious transfer
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
BENNETT, C. H., BRASSARD, G., CREPEAU, C., AND SKUBISZEWSKA, M.-H. 1992. In Practical Quantum Oblivious Transfer. Advances in Cryptology: CRYPTO '91: Proceedings. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, pp. 362-371.
-
(1992)
Advances in Cryptology: CRYPTO '91: Proceedings
, vol.576
, pp. 362-371
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Skubiszewska, M.-H.4
-
6
-
-
4243789313
-
-
BENNETT, C. H., BRASSARD, G., POPESCU, S., SCHUMACHER, B., SMOLIN, J., AND WOOTTERS, W. K. 1966. Phys. Rev. Lett. 76, 722-725.
-
(1966)
Phys. Rev. Lett.
, vol.76
, pp. 722-725
-
-
Bennett, C.H.1
Brassard, G.2
Popescu, S.3
Schumacher, B.4
Smolin, J.5
Wootters, W.K.6
-
7
-
-
0023985539
-
Privacy amplification by public discussion
-
BENNETT, C. H., BRASSARD, G., AND ROBERT, J.-M. 1988. Privacy amplification by public discussion. SIAM J. Comput. 17, 2 (Apr.). 210-229.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2 APR.
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
8
-
-
0003432201
-
Security of quantum key distribution against all collective attacks
-
quant-ph/9801022
-
BIHAM, E., BOYER, M., BRASSARD, G., VAN DE GRAAF, J., AND MOR, T. 1998. Security of quantum key distribution against all collective attacks. LANL archives quant-ph/9801022.
-
(1998)
LANL Archives
-
-
Biham, E.1
Boyer, M.2
Brassard, G.3
Van De Graaf, J.4
Mor, T.5
-
9
-
-
0001452279
-
On the security of quantum cryptography against collective attacks
-
BIHAM, E., AND MOR, T. 1996. On the security of quantum cryptography against collective attacks. Phys. Rev. Lett. 78, pp. 2256-2259.
-
(1996)
Phys. Rev. Lett.
, vol.78
, pp. 2256-2259
-
-
Biham, E.1
Mor, T.2
-
10
-
-
0012182948
-
Cryptology column - 25 years of quantum cryptography
-
BRASSARD, G., AND CREEPEAU, C. 1996. Cryptology column - 25 years of quantum cryptography. SIGACT News 27, 3 (Sept.). 13-24.
-
(1996)
SIGACT News
, vol.27
, Issue.3 SEPT.
, pp. 13-24
-
-
Brassard, G.1
Creepeau, C.2
-
11
-
-
6144265213
-
-
DEUTSCH, D., EKERT, A. K., JOZSA, R., MACCHIAVELLO, C., POPESCU, S., AND SANPERA, A. 1996. Phys. Rev. Lett. 77, 2818-2821.
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 2818-2821
-
-
Deutsch, D.1
Ekert, A.K.2
Jozsa, R.3
Macchiavello, C.4
Popescu, S.5
Sanpera, A.6
-
12
-
-
84861951323
-
Perfectly concealing quantum bit commitment from any quantum one-way permutation
-
to be published
-
DUMAIS, P., SALVAIL, L., AND MAYERS, D. 2000. Perfectly concealing quantum bit commitment from any quantum one-way permutation. In Eurocrypt '2000. (to be published).
-
(2000)
Eurocrypt '2000
-
-
Dumais, P.1
Salvail, L.2
Mayers, D.3
-
13
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
EKERT, A. 1991. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661.
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661
-
-
Ekert, A.1
-
14
-
-
4243115678
-
-
December 1999 (no proceedings)
-
INAMORI, H., LUTKENHAUS, N., AND MAYERS, D. 1999. Security of Practical Quantum Key Distribution, presented at the NEC Workshop on Quantum Cryptography, December 1999 (no proceedings).
-
(1999)
Security of Practical Quantum Key Distribution, Presented at the NEC Workshop on Quantum Cryptography
-
-
Inamori, H.1
Lutkenhaus, N.2
Mayers, D.3
-
15
-
-
0039284827
-
The computational complexity of machine learning
-
MIT Press, Original proof in: H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. (1952)
-
KEARNS, M. J. 1989. The computational complexity of machine learning. MIT Press, (Original proof in: H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23, 493 (1952).
-
(1989)
Ann. Math. Stat.
, vol.23
, pp. 493
-
-
Kearns, M.J.1
-
18
-
-
84957696255
-
On the security of the quantum oblivious transfer and key distribution protocols
-
Springer-Verlag, New York
-
MAYERS, D. 1995. On the security of the quantum oblivious transfer and key distribution protocols. Advances in Cryptology - Proceedings of Crypto '95 (Aug.). Springer-Verlag, New York, pp. 124-135.
-
(1995)
Advances in Cryptology - Proceedings of Crypto '95
, Issue.AUG.
, pp. 124-135
-
-
Mayers, D.1
-
19
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels
-
Springer-Verlag, New York
-
MAYERS, D. 1996. Quantum key distribution and string oblivious transfer in noisy channels. Advances in Cryptology - Proceedings of Crypto '96 (Aug.). Springer-Verlag, New York, pp. 343-357.
-
(1996)
Advances in Cryptology - Proceedings of Crypto '96
, Issue.AUG.
, pp. 343-357
-
-
Mayers, D.1
-
20
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
MAYERS, D. 1997. Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 17 (Apr.), pp. 3414-3417.
-
(1997)
Phys. Rev. Lett.
, vol.78
, Issue.17 APR.
, pp. 3414-3417
-
-
Mayers, D.1
-
22
-
-
4243120103
-
Quantum key distribution is unconditionally secure
-
in preparation
-
MAYERS, D. 2001b. Quantum key distribution is unconditionally secure. Tech. Rep. (in preparation).
-
(2001)
Tech. Rep.
-
-
Mayers, D.1
-
23
-
-
0013099162
-
Quantum oblivious transfer is secure against all individual measurements
-
(Dallas, Tex., Nov.)
-
MAYERS, D., AND SALVAIL, L. 1994. Quantum oblivious transfer is secure against all individual measurements. Proceedings of the Workshop on Physics and Computation, PhysComp'94, (Dallas, Tex., Nov.). pp. 69-77.
-
(1994)
Proceedings of the Workshop on Physics and Computation, PhysComp'94
, pp. 69-77
-
-
Mayers, D.1
Salvail, L.2
-
26
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
SHOR, P. W., AND PRESKILL, J. 2000. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441.
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 441
-
-
Shor, P.W.1
Preskill, J.2
-
27
-
-
0019572642
-
New hash function and their use in authentication and set equality
-
WEGMAN, M. N., AND CARTER, J. L. 1981. New hash function and their use in authentication and set equality, J. Comput. Syst. Sci. 22, 265-279.
-
(1981)
J. Comput. Syst. Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|