-
1
-
-
84969361843
-
Practical quantum oblivious transfer
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Bennett, C.H., Brassard, G., Crépeau, C., Skubiszewska, M.-H.: Practical quantum oblivious transfer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 351-366. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
2
-
-
33748760285
-
-
Crépeau, C., Dumais, P., Mayers, D., Salvail, L.: Computational collapse of quantum state with application to oblivious transfer. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 374-393. Springer, Heidelberg (2004)
-
Crépeau, C., Dumais, P., Mayers, D., Salvail, L.: Computational collapse of quantum state with application to oblivious transfer. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 374-393. Springer, Heidelberg (2004)
-
-
-
-
3
-
-
70350276849
-
-
Damgård, I.B., Fehr, S., Lunemann, C., Salvail, L., Schaffner, C.: Improving the security of quantum protocols (2009), http://arxiv.org/abs/0902. 3918
-
(2009)
Improving the security of quantum protocols
-
-
Damgård, I.B.1
Fehr, S.2
Lunemann, C.3
Salvail, L.4
Schaffner, C.5
-
4
-
-
38049138207
-
A tight high-order entropic quantum uncertainty relation with applications
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Damgård, I.B., Fehr, S., Renner, R., Salvail, L., Schaffner, C.: A tight high-order entropic quantum uncertainty relation with applications. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 360-378. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 360-378
-
-
Damgård, I.B.1
Fehr, S.2
Renner, R.3
Salvail, L.4
Schaffner, C.5
-
5
-
-
35048864318
-
Zero-knowledge proofs and string commitments withstanding quantum attacks
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Damgård, I.B., Fehr, S., Salvail, L.: Zero-knowledge proofs and string commitments withstanding quantum attacks. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 254-272. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 254-272
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
-
6
-
-
33748633496
-
Cryptography in the bounded quantum-storage model
-
Damgård, I.B., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded quantum-storage model. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 449-458 (2005), http://arxiv.org/ abs/quant-ph/0508222v2
-
(2005)
46th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 449-458
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
7
-
-
38049128687
-
Secure identification and QKD in the bounded-quantum-storage model
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Damgåard, I.B., Fehr, S., Salvail, L., Schaffner, C.: Secure identification and QKD in the bounded-quantum-storage model. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 342-359. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 342-359
-
-
Damgåard, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
8
-
-
44949109032
-
Cryptography in the bounded-quantum-storage model
-
Damgård, I.B., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded-quantum-storage model. SIAM Journal on Computing 37(6), 1865-1890 (2008)
-
(2008)
SIAM Journal on Computing
, vol.37
, Issue.6
, pp. 1865-1890
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
10
-
-
70350273695
-
Composing quantum protocols in a classical environment
-
Theory of Cryptography Conference TCC, Springer, Heidelberg
-
Fehr, S., Schaffner, C.: Composing quantum protocols in a classical environment. In: Theory of Cryptography Conference (TCC). LNCS, vol. 5444, pp. 350-367. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 350-367
-
-
Fehr, S.1
Schaffner, C.2
-
11
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
Hoeffding, W.: Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association 58(301), 13-30 (1963)
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
12
-
-
57049100461
-
Games for exchanging information
-
TCC, Springer, Heidelberg
-
Kol, G., Naor, M.: Games for exchanging information. In: TCC 2008. LNCS, vol. 4948, pp. 423-432. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 423-432
-
-
Kol, G.1
Naor, M.2
-
13
-
-
0001236013
-
Insecurity of quantum secure computations
-
Lo, H.-K.: Insecurity of quantum secure computations. Physical Review A 56(2), 1154-1162 (1997)
-
(1997)
Physical Review A
, vol.56
, Issue.2
, pp. 1154-1162
-
-
Lo, H.-K.1
-
15
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
16
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
STOC, pp
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: 37th Annual ACM Symposium on Theory of Computing (STOC), pp. 84-93 (2005)
-
(2005)
37th Annual ACM Symposium on Theory of Computing
, pp. 84-93
-
-
Regev, O.1
-
17
-
-
24144485355
-
-
Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 407-425. Springer, Heidelberg (2005)
-
Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407-425. Springer, Heidelberg (2005)
-
-
-
-
19
-
-
33746796200
-
Zero-knowledge against quantum attacks
-
STOC, pp
-
Watrous, J.: Zero-knowledge against quantum attacks. In: 38th Annual ACM Symposium on Theory of Computing (STOC), pp. 296-305 (2006), http://www.cs.uwaterloo.ca/~watrous/papers.html
-
(2006)
38th Annual ACM Symposium on Theory of Computing
, pp. 296-305
-
-
Watrous, J.1
-
20
-
-
44949188319
-
Cryptography from noisy storage
-
Wehner, S., Schaffner, C., Terhal, B.M.: Cryptography from noisy storage. Physical Review Letters 100(22), 220-502 (2008)
-
(2008)
Physical Review Letters
, vol.100
, Issue.22
, pp. 220-502
-
-
Wehner, S.1
Schaffner, C.2
Terhal, B.M.3
|