-
1
-
-
0025535378
-
Simple constructions of almost k-wise independent random variables
-
Alon, N., Goldreich, O., Håstad, J., Peralta, R.: Simple constructions of almost k-wise independent random variables. In: IEEE symposium on foundations of computer science, pp. 544-553 (1990) (Pubitemid 21663247)
-
(1990)
Annual Symposium on Foundations of Computer Science - Proceedings
, vol.2
, pp. 544-553
-
-
Alon, N.1
Goldreich, O.2
Håstad, J.3
Peralta, R.4
-
2
-
-
0034505624
-
Private quantum channels
-
Ambainis, A., Mosca, M., Tapp, A., de Wolf, R.: Private quantum channels. In: IEEE symposium on foundations of computer science, pp. 547-553 (2000) (Pubitemid 32075923)
-
(2000)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 547-553
-
-
Ambainis, A.1
Mosca, M.2
Tapp, A.3
De Wolf, R.4
-
3
-
-
35048868371
-
Small pseudo-random families of matrices: Derandomizing approximate quantum encryption
-
Springer
-
Ambainis, A., Smith, A.: Small pseudo-random families of matrices: derandomizing approximate quantum encryption. In: Proceeding of RANDOM 2004, pp. 249-260. Springer (2004)
-
(2004)
Proceeding of RANDOM 2004
, pp. 249-260
-
-
Ambainis, A.1
Smith, A.2
-
4
-
-
84958626314
-
Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information
-
Advances in Cryptology - CRYPTO '97
-
Canetti, R.: Towards realizing random oracles: hash functions that hide all partial information. In: Lecture Notes in Computer Science, vol. 1294, pp. 455-469. Springer, London, UK (1997) (Pubitemid 127112572)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1294
, pp. 455-469
-
-
Canetti, R.1
-
5
-
-
0031624874
-
Perfectly one-way probabilistic hash functions
-
ACM
-
Canetti, R., Micciancio, D., Reingold, O.: Perfectly one-way probabilistic hash functions. In: 30th Annual ACM Symposium on Theory of Computing, pp. 131-140. ACM (1998)
-
(1998)
30th Annual ACM Symposium on Theory of Computing
, pp. 131-140
-
-
Canetti, R.1
Micciancio, D.2
Reingold, O.3
-
7
-
-
77953780486
-
Quantum entropic security and approximate quantum encryption
-
To appear
-
Desrosiers, S.P., Dupuis, F.: Quantum entropic security and approximate quantum encryption. IEEE Trans Inf Theory (To appear)
-
IEEE Trans Inf Theory
-
-
Desrosiers, S.P.1
Dupuis, F.2
-
10
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
ACM, New York, NY, USA
-
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: STOC '89: Proceedings of the twenty-first annual ACM symposium on theory of computing, pp. 25-32. ACM, New York, NY, USA (1989)
-
(1989)
STOC '89: Proceedings of the Twenty-first Annual ACM Symposium on Theory of Computing
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
13
-
-
0040221330
-
Quantum detection and estimation theory
-
C.W. Helstrom 1969 Quantum detection and estimation theory J. Stat. Phys. 1 2 231 252
-
(1969)
J. Stat. Phys.
, vol.1
, Issue.2
, pp. 231-252
-
-
Helstrom, C.W.1
-
15
-
-
84947270656
-
How to fool an unbounded adversary with a short key
-
Springer-Verlag, London, UK
-
Russell, A., Wang, H.: How to fool an unbounded adversary with a short key. In: EUROCRYPT '02: Proceedings of the international conference on the theory and applications of cryptographic techniques, pp. 133-148. Springer-Verlag, London, UK (2002)
-
(2002)
EUROCRYPT '02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 133-148
-
-
Russell, A.1
Wang, H.2
|