-
1
-
-
0030086632
-
-
N. Nisan and D. Zuckerman, Randomness is linear in space, J. Comp. Syst. Sci., 52, pp. 43-52, 1996, a preliminary version was presented at STOC'93.
-
N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comp. Syst. Sci., vol. 52, pp. 43-52, 1996, a preliminary version was presented at STOC'93.
-
-
-
-
2
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
Online, Available
-
R. Shaltiel, "Recent developments in explicit constructions of extractors," Bull. EATCS vol. 77, pp. 67-95, 2002 [Online]. Available" http://dblp.uni-trier.de
-
(2002)
Bull. EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
3
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," J. Amer. Inst. Elec. Eng., vol. 55, pp. 109-115, 1926.
-
(1926)
J. Amer. Inst. Elec. Eng
, vol.55
, pp. 109-115
-
-
Vernam, G.S.1
-
5
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti, "Security and composition of multi-party cryptographic protocols," J. Cryptol., vol. 13, no. 1, pp. 143-202, 2000.
-
(2000)
J. Cryptol
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
6
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
7
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pt. 2, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6 PART. 2
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
8
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. Maurer, "Conditionally-perfect secrecy and a provably-secure randomized cipher," J. Cryptol., vol. 5, no. 1, pp. 53-66, 1992.
-
(1992)
J. Cryptol
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
9
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Jun
-
Y. Aumann, Y. Z. Ding, and M. O. Rabin, "Everlasting security in the bounded storage model," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1668-1680, Jun. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
10
-
-
0036040061
-
Tight security proofs for the bounded-storage model
-
Proc. 34th Annu. ACM Symp. Theory of Computing
-
S. Dziembowski and U. Maurer, "Tight security proofs for the bounded-storage model," in Proc. 34th Annu. ACM Symp. Theory of Computing, 2002, pp. 341-350, ser. Lecture Notes in Computer Science.
-
(2002)
ser. Lecture Notes in Computer Science
, pp. 341-350
-
-
Dziembowski, S.1
Maurer, U.2
-
11
-
-
84937432504
-
Hyper-encryption against space-bounded adversaries from on-line strong extractors
-
Advances in Cryptology, CRYPTO 2003, Berlin, Germany: Springer-verlag
-
C. Lu, "Hyper-encryption against space-bounded adversaries from on-line strong extractors," in Advances in Cryptology - CRYPTO 2003, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-verlag, 2002, pp. 18-22.
-
(2002)
ser. Lecture Notes in Computer Science
, pp. 18-22
-
-
Lu, C.1
-
12
-
-
4344628859
-
On constructing locally computable extractors and cryptosystems in the bounded-storage model
-
S. P. Vadhan, "On constructing locally computable extractors and cryptosystems in the bounded-storage model," J. Cryptology, vol. 17, no. 1, pp. 43-77, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
13
-
-
23744481389
-
Security of BB84 QKD Protocol
-
Online, Available:, slides Part II
-
M. Ben-Or, "Security of BB84 QKD Protocol," 2002 [Online]. Available: http://www.msri.org/publications/in/msri/2002/quantumintro, (slides) Part II.
-
(2002)
-
-
Ben-Or, M.1
-
14
-
-
23744435400
-
On the power of quantum memory
-
Jul, Online, Available
-
R. König, U. Maurer, and R. Renner, "On the power of quantum memory," IEEE Trans. Inf. Theory vol. 51, no. 7, pp. 2391-2401, Jul. 2005 [Online]. Available: http://arxiv.org/abs/quant-ph/0305154
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.7
, pp. 2391-2401
-
-
König, R.1
Maurer, U.2
Renner, R.3
-
15
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
Proc. Second Theory of Cryptography Conf. TCC, Berlin, Germany: Springer-Verlag, Online, Available
-
R. Renner and R. König, "Universally composable privacy amplification against quantum adversaries," in Proc. Second Theory of Cryptography Conf. TCC, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2005, vol. 3378, pp. 407-425 [Online]. Available: http://arxiv.org/abs/quant-ph/0403133
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3378
, pp. 407-425
-
-
Renner, R.1
König, R.2
-
16
-
-
33846181385
-
-
Zurich, Switzerland, Online, Available
-
R. Renner, "Security of quantum key distribution" Ph.D. dissertation, Swiss Federal Institute of Technology (ETH), Zurich, Switzerland, 2005 [Online]. Available: http://arxiv.org/abs/ quant-ph/0512258
-
(2005)
Security of quantum key distribution Ph.D. dissertation, Swiss Federal Institute of Technology (ETH)
-
-
Renner, R.1
-
18
-
-
33748633496
-
Cryptography in the bounded quantum-storage model
-
Pittsburgh, PA, Oct
-
I. Damgård, S. Fehr, L. Salvail, and C. Schaffner, "Cryptography in the bounded quantum-storage model," in Proc. 46th Annu. IEEE Symp. Foundations of Computer Science (FOCS , Pittsburgh, PA, Oct. 2005, pp. 449-458.
-
(2005)
Proc. 46th Annu. IEEE Symp. Foundations of Computer Science (FOCS
, pp. 449-458
-
-
Damgård, I.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
19
-
-
34547426398
-
-
Online, Available
-
H. Buhrman, M. Christandl, P. Hayden, H. W. Lo, and S. Weliner, "On the (Im)Possibility of Quantum String Commitment," 2005 [Online]. Available: http://arxiv.org/abs/quant-ph/0504078
-
(2005)
On the (Im)Possibility of Quantum String Commitment
-
-
Buhrman, H.1
Christandl, M.2
Hayden, P.3
Lo, H.W.4
Weliner, S.5
-
21
-
-
0003617018
-
Information-Theoretically and Computationally Secure Key Agreement in Cryptography
-
Ph.D. dissertation, Swiss Federal Institute of Technology ETH Zurich, Zurich, Switzerland, ETH dissertation No. 13138
-
S. Wolf, "Information-Theoretically and Computationally Secure Key Agreement in Cryptography" Ph.D. dissertation, Swiss Federal Institute of Technology (ETH Zurich), Zurich, Switzerland, 1999, ETH dissertation No. 13138.
-
(1999)
-
-
Wolf, S.1
-
22
-
-
1642370829
-
Locking classical correlations in quantum states
-
D. DiVincenzo, M. Horodecki, D. Leung, J. Smolin, and B. Terhal, "Locking classical correlations in quantum states," Phys. Rev. Lett., vol. 92, p. 067902, 2004.
-
(2004)
Phys. Rev. Lett
, vol.92
, pp. 067902
-
-
DiVincenzo, D.1
Horodecki, M.2
Leung, D.3
Smolin, J.4
Terhal, B.5
-
23
-
-
34047263436
-
Small accessible quantum information does not imply security
-
Online, Available
-
R. König, R. Renner, A. Bariska, and U. Maurer, "Small accessible quantum information does not imply security," Phys. Rev. Lett. vol. 98, no. 14, p. 140502, 2007 [Online]. Available: http://link.aps.org/abstract/PRL/v98/e140502
-
(2007)
Phys. Rev. Lett
, vol.98
, Issue.14
, pp. 140502
-
-
König, R.1
Renner, R.2
Bariska, A.3
Maurer, U.4
-
24
-
-
39849096824
-
-
Master's thesis, Karlsruhe, Germany, Dec, Online, Available
-
D. Unruh, "Formal Security in Quantum Cryptology" Master's thesis, Karlsruhe, Germany, Dec. 2002 [Online]. Available: http://www.unrhu.de/DniQ/Publications
-
(2002)
Formal Security in Quantum Cryptology
-
-
Unruh, D.1
-
27
-
-
24144445587
-
The universal composable security of quantum key distribution
-
Proc. Second Theory of Cryptography Conf. TCC, Berlin, Germany: Springer-Verlag, Online, Available
-
M. Ben-Or, M. Horodecki, D. W. Leung, D. Mayers, and J. Oppenheim, "The universal composable security of quantum key distribution," in Proc. Second Theory of Cryptography Conf. TCC, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2005, vol. 3378, pp. 386-406 [Online]. Available: http://arxiv.org/abs/quant-ph/0409078
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3378
, pp. 386-406
-
-
Ben-Or, M.1
Horodecki, M.2
Leung, D.W.3
Mayers, D.4
Oppenheim, J.5
-
28
-
-
0035981791
-
Reversing quantum dynamics with near-optimal quantum and classical fidelity
-
H. Barnum and E. Knill, "Reversing quantum dynamics with near-optimal quantum and classical fidelity," J. Math. Phys., vol. 43, no. 5, pp. 2097-2106, 2002.
-
(2002)
J. Math. Phys
, vol.43
, Issue.5
, pp. 2097-2106
-
-
Barnum, H.1
Knill, E.2
-
29
-
-
0000229839
-
A 'pretty good' measurement for distinguishing quantum states
-
P. Hausladen and W. Wootters, "A 'pretty good' measurement for distinguishing quantum states," J. Mod. Opt., vol. 41, no. 12, pp. 2385-2390, 1994.
-
(1994)
J. Mod. Opt
, vol.41
, Issue.12
, pp. 2385-2390
-
-
Hausladen, P.1
Wootters, W.2
-
31
-
-
0041175120
-
Computing with very weak random sources
-
Santa Fe, NM, Nov, Online, Available
-
A. Srinivasan and D. Zuckerman, "Computing with very weak random sources," in Proc. IEEE Symp. Foundations of Computer Science, Santa Fe, NM, Nov. 1994, pp. 264-275 [Online]. Available: citeseer.ist.psu. edu/447609.html
-
(1994)
Proc. IEEE Symp. Foundations of Computer Science
, pp. 264-275
-
-
Srinivasan, A.1
Zuckerman, D.2
-
32
-
-
0034503771
-
Extracting randomness via repeated condensing
-
Redondo Beach, CA, Nov, Online, Available
-
O. Reingold, R. Shaltiel, and A. Wigderson, "Extracting randomness via repeated condensing," in Proc. IEEE Symp Foundations of Computer Science, Redondo Beach, CA, Nov. 2000, pp. 22-31 [Online]. Available: citeseer.ist.psu.edu/reingoldOOextracting.html
-
(2000)
Proc. IEEE Symp Foundations of Computer Science
, pp. 22-31
-
-
Reingold, O.1
Shaltiel, R.2
Wigderson, A.3
-
33
-
-
0032606505
-
Optimal lower bounds for quantum automata and random access codes
-
New York City, Oct, quant-ph/9904093
-
A. Nayak, "Optimal lower bounds for quantum automata and random access codes," in Proc. 40th Annu. Symp. Foundations of Computer Science New York City, Oct. 1999, pp. 369-377, quant-ph/9904093.
-
(1999)
Proc. 40th Annu. Symp. Foundations of Computer Science
, pp. 369-377
-
-
Nayak, A.1
-
34
-
-
0032631760
-
Dense quantum coding and a lower bound for 1-way quantum automata
-
Atlanta, GA, May, quant-ph/ 9804043
-
A. Ambainis, A. Nayak, A. Ta-Shma, and U. Vazirani, "Dense quantum coding and a lower bound for 1-way quantum automata," in Proc. 31th ACM Symp. Theory of Computing, Atlanta, GA, May 1999, quant-ph/ 9804043.
-
(1999)
Proc. 31th ACM Symp. Theory of Computing
-
-
Ambainis, A.1
Nayak, A.2
Ta-Shma, A.3
Vazirani, U.4
-
35
-
-
29744466493
-
A de Finetti representation for finite symmetric quantum states
-
R. König and R. Renner, "A de Finetti representation for finite symmetric quantum states," J. Math. Phys., vol. 46, p. 122108, 2005.
-
(2005)
J. Math. Phys
, vol.46
, pp. 122108
-
-
König, R.1
Renner, R.2
-
36
-
-
39849083720
-
-
personal communication
-
P. Sen and A. Nayak, 2007, personal communication.
-
(2007)
-
-
Sen, P.1
Nayak, A.2
|