-
1
-
-
0000486090
-
On the einstein-podolsky-rosen paradox
-
Long Island City, NY
-
Bell, J. (1964). On the einstein-podolsky-rosen paradox. In Physics, volume 1, pages 195-200, Long Island City, NY.
-
(1964)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.1
-
2
-
-
0003259517
-
Quantum cryptography: Publickey distribution and coin tossing
-
Bangalore, India
-
Bennett, C. and Brassard, G. (1984). Quantum cryptography: Publickey distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pages 175-179, Bangalore, India.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.1
Brassard, G.2
-
3
-
-
4243059985
-
Teleporting an unknown quantum state via dual classical and epr channels
-
Bennett, C., Brassard, G., Crepeau, C., Jozsa, R., Peres, A., and Wootters., W. (1993). Teleporting an unknown quantum state via dual classical and epr channels. In Physical Review Letters, volume 70, pages 1895-1899.
-
(1993)
Physical Review Letters
, vol.70
, pp. 1895-1899
-
-
Bennett, C.1
Brassard, G.2
Crepeau, C.3
Jozsa, R.4
Peres, A.5
Wootters, W.6
-
4
-
-
42549130867
-
Quantum entanglement and its applications on secure computation
-
Cincinnati, Ohio
-
Chou, Y.-H., Tsai, L-M., and Kuo, S.-Y. (2006). Quantum entanglement and its applications on secure computation. In Proceedings of 6th IEEE Conference on Nanotechnology, Cincinnati, Ohio.
-
(2006)
Proceedings of 6th IEEE Conference on Nanotechnology
-
-
Chou, Y.-H.1
Tsai, L.-M.2
Kuo, S.-Y.3
-
5
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
Clauser, J., Home, M., Shimony, A., and Holt, R. (1969). Proposed experiment to test local hidden-variable theories. In Physical Review Letters, volume 23, pages 880-884.
-
(1969)
Physical Review Letters
, vol.23
, pp. 880-884
-
-
Clauser, J.1
Home, M.2
Shimony, A.3
Holt, R.4
-
6
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., and Lempel, A. (1985). A randomized protocol for signing contracts. In Communications of the ACM, volume 28.
-
(1985)
Communications of the ACM
, vol.28
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
7
-
-
0034497243
-
The relationship between public key encryption and oblivious transfer
-
Gertner, Y., Kannan, S., Malkin, T., Reingold, O., and Viswanathan, M. (2000). The relationship between public key encryption and oblivious transfer. In Proceedings of 41st Annual Symposium on Foundations of Computer Science, pages 325-335.
-
(2000)
Proceedings of 41st Annual Symposium on Foundations of Computer Science
, pp. 325-335
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
8
-
-
0023545076
-
How to play any mental game
-
New York, New York
-
Goldreich, O., Micali, S., and Wigderson, A. (1987). How to play any mental game. In Proceedings of the nineteenth annual ACM conference on Theory of computing, pages 218-229, New York, New York.
-
(1987)
Proceedings of the nineteenth annual ACM conference on Theory of computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
IEEE Computer Society Press
-
Shor, P (1994). Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of 35nd Annual Symposium on Foundations of Computer Science, pages 124-134. IEEE Computer Society Press.
-
(1994)
Proceedings of 35nd Annual Symposium on Foundations of Computer Science
, pp. 124-134
-
-
Shor, P.1
-
13
-
-
0034449899
-
Reducing oblivious string transfer to universal oblivious transfer
-
Sorrento, Italy
-
Wolf, S. (2000). Reducing oblivious string transfer to universal oblivious transfer. In Proceedings of International Symposium on Information Theory, page 465, Sorrento, Italy.
-
(2000)
Proceedings of International Symposium on Information Theory
, pp. 465
-
-
Wolf, S.1
|