-
5
-
-
26444482584
-
Unfair noisy channels and oblivious transfer
-
I. B. Damgård, S. Fehr, K. Morozov, and L. Salvail. Unfair noisy channels and oblivious transfer. In Theory of Cryptography -TCC 2004, pages 355-373, 2004.
-
(2004)
Theory of Cryptography -TCC 2004
, pp. 355-373
-
-
Damgård, I.B.1
Fehr, S.2
Morozov, K.3
Salvail, L.4
-
6
-
-
33750391293
-
Cryptography in the bounded quantum-storage model
-
BRICS. Department of Computer Science, University of Aarhus
-
I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner. Cryptography in the bounded quantum-storage model. Research Series RS-05-20, BRICS. Department of Computer Science, University of Aarhus (www.brics.dk), 2005.
-
(2005)
Research Series RS-05-20
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
8
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
I. B. Damgård, J. Kilian, and L. Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Advances in Cryptology - EURO-CRYPT 1999, pages 56-73, 1999.
-
(1999)
Advances in Cryptology - EURO-CRYPT 1999
, pp. 56-73
-
-
Damgård, I.B.1
Kilian, J.2
Salvail, L.3
-
9
-
-
35048840744
-
Constant-round oblivious transfer in the bounded storage model
-
Y. Z. Ding, D. Harnik, A. Rosen, and R. Shaltiel. Constant-round oblivious transfer in the bounded storage model. In Theory of Cryptography - TCC 2004, pages 446-472, 2004.
-
(2004)
Theory of Cryptography - TCC 2004
, pp. 446-472
-
-
Ding, Y.Z.1
Harnik, D.2
Rosen, A.3
Shaltiel, R.4
-
10
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology - EUROCRYPT 2004, pages 523-540, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
11
-
-
84948989963
-
Perfectly concealing quantum bit commitment from any quantum one-way permutation
-
P. Dumais, D. Mayers, and L. Salvail. Perfectly concealing quantum bit commitment from any quantum one-way permutation. In Advances in Cryptology - EUROCRYPT 2000, pages 300-315, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 300-315
-
-
Dumais, P.1
Mayers, D.2
Salvail, L.3
-
13
-
-
0032667067
-
Cryptographic distinguishability measures for quantum-mechanical states
-
C. A. Fuchs and J. van de Graaf. Cryptographic distinguishability measures for quantum-mechanical states. IEEE Transactions on Information Theory, 45(4):1216-1227, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.4
, pp. 1216-1227
-
-
Fuchs, C.A.1
Van De Graaf, J.2
-
14
-
-
0001260566
-
Is quantum bit commitment really possible?
-
April
-
H.-K. Lo and H. F. Chau. Is quantum bit commitment really possible? Physical Review Letters, 78:3410-3413, April 1997.
-
(1997)
Physical Review Letters
, vol.78
, pp. 3410-3413
-
-
Lo, H.-K.1
Chau, H.F.2
-
15
-
-
0001287029
-
Generalized entropic uncertainty relations
-
March
-
H. Maassen and J. B. M. Uffink. Generalized entropic uncertainty relations. Physical Review Letters, 60(12):1103-1106, March 1988.
-
(1988)
Physical Review Letters
, vol.60
, Issue.12
, pp. 1103-1106
-
-
Maassen, H.1
Uffink, J.B.M.2
-
16
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
April
-
D. Mayers. Unconditionally secure quantum bit commitment is impossible. Physical Review Letters, 78:3414-3417, April 1997.
-
(1997)
Physical Review Letters
, vol.78
, pp. 3414-3417
-
-
Mayers, D.1
-
18
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
February
-
R. Renner and R. König. Universally composable privacy amplification against quantum adversaries. In Theory of Cryptography - TCC 2005, pages 407-425, February 2005.
-
(2005)
Theory of Cryptography - TCC 2005
, pp. 407-425
-
-
Renner, R.1
König, R.2
-
19
-
-
84957609540
-
Quantum bit commitment from a physical assumption
-
L. Salvail. Quantum bit commitment from a physical assumption. In Advances in Cryptology - CRYPTO 1998, pages 338-353, 1998.
-
(1998)
Advances in Cryptology - CRYPTO 1998
, pp. 338-353
-
-
Salvail, L.1
-
20
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
July
-
P. W. Shor and J. Preskill. Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters. 85:441-444, July 2000.
-
(2000)
Physical Review Letters
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
|