-
1
-
-
0000486090
-
On the einstein-podolsky-rosen paradox
-
Long Island City, NY
-
J. Bell. On the einstein-podolsky-rosen paradox. In Physics, volume 1, pages 195-200, Long Island City, NY, 1964.
-
(1964)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.1
-
2
-
-
0003259517
-
Quantum cryptography: Publickey distribution and coin tossing
-
Bangalore, India
-
C. Bennett and G. Brassard. Quantum cryptography: Publickey distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pages 175-179, Bangalore, India, 1984.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.1
Brassard, G.2
-
3
-
-
4243059985
-
Teleporting an unknown quantum state via dual classical and epr channels
-
C. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres, and W. Wootters. Teleporting an unknown quantum state via dual classical and epr channels. In Physical Review Letters, volume 70, pages 1895-1899, 1993.
-
(1993)
Physical Review Letters
, vol.70
, pp. 1895-1899
-
-
Bennett, C.1
Brassard, G.2
Crepeau, C.3
Jozsa, R.4
Peres, A.5
Wootters, W.6
-
5
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
J. Clauser, M. Home, A. Shimony, and R. Holt. Proposed experiment to test local hidden-variable theories. In Physical Review Letters, volume 23, pages 880-884, 1969.
-
(1969)
Physical Review Letters
, vol.23
, pp. 880-884
-
-
Clauser, J.1
Home, M.2
Shimony, A.3
Holt, R.4
-
7
-
-
0034497243
-
The relationship between public key encryption and oblivious transfer
-
Y. Gertner, S. Kannan, T. Malkin, O. Reingold, and M. Viswanathan. The relationship between public key encryption and oblivious transfer. In Proceedings of 41st Annual Symposium on Foundations of Computer Science, pages 325-335, 2000.
-
(2000)
Proceedings of 41st Annual Symposium on Foundations of Computer Science
, pp. 325-335
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
8
-
-
0023545076
-
How to play any mental game
-
New York, New York
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the nineteenth annual ACM conference on Theory of computing, pages 218-229, New York, New York, 1987.
-
(1987)
Proceedings of the nineteenth annual ACM conference on Theory of computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
0003851399
-
-
Second Edition, chapter 5. John Wiley and Sons, Inc
-
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, chapter 5. John Wiley and Sons, Inc., 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
13
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
IEEE Computer Society Press
-
P. Shor. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of 35nd Annual Symposium on Foundations of Computer Science, pages 124-134. IEEE Computer Society Press, 1994.
-
(1994)
Proceedings of 35nd Annual Symposium on Foundations of Computer Science
, pp. 124-134
-
-
Shor, P.1
-
14
-
-
0034449899
-
Reducing oblivious string transfer to universal oblivious transfer
-
Sorrento, Italy
-
S. Wolf. Reducing oblivious string transfer to universal oblivious transfer. In Proceedings of International Symposium on Information Theory, page 465, Sorrento, Italy, 2000.
-
(2000)
Proceedings of International Symposium on Information Theory
, pp. 465
-
-
Wolf, S.1
-
15
-
-
33749440437
-
Oblivious transfer and quantum non-locality
-
Adelaide, Australia
-
S. Wolf and J. Wullschleger. Oblivious transfer and quantum non-locality. In ISIT'05, Proceedings of International Symposium on Information Theory, pages 1745-1748, Adelaide, Australia, 2005.
-
(2005)
ISIT'05, Proceedings of International Symposium on Information Theory
, pp. 1745-1748
-
-
Wolf, S.1
Wullschleger, J.2
|