-
1
-
-
0032631760
-
Dense quantum coding and quantum finite automata
-
A. Ambainis, A. Nayak, A. Ta-Shma, and U. Vazirani. Dense quantum coding and quantum finite automata. In STOC, pages 376-383, 1999.
-
(1999)
STOC
, pp. 376-383
-
-
Ambainis, A.1
Nayak, A.2
Ta-Shma, A.3
Vazirani, U.4
-
2
-
-
0942292954
-
Dense quantum coding and quantum finite automata
-
A. Ambainis, A. Nayak, A. Ta-Shma, and U. Vazirani. Dense quantum coding and quantum finite automata. Journal of the ACM, 49(4):496-511, 2002.
-
(2002)
Journal of the ACM
, vol.49
, Issue.4
, pp. 496-511
-
-
Ambainis, A.1
Nayak, A.2
Ta-Shma, A.3
Vazirani, U.4
-
3
-
-
0029405656
-
Generalized privacy amplification
-
C.H. Bennett, G. Brassard, C. Crepeau, and U. Maurer. Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6 Part 2):1915-1923, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6 PART 2
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
C.H. Bennett, G. Brassard, and J.M. Robert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
5
-
-
19844376567
-
A Generic Security Proof for Quantum Key Distribution
-
Technical report, Arxiv preprint quant-ph/0402131
-
M. Christandl, R. Renner, and A. Ekert. A Generic Security Proof for Quantum Key Distribution. Technical report, Arxiv preprint quant-ph/0402131, 2004.
-
(2004)
-
-
Christandl, M.1
Renner, R.2
Ekert, A.3
-
7
-
-
34848837353
-
Correcting errors without leaking partial information
-
Y. Dodis and A. Smith. Correcting errors without leaking partial information. STOC, pages 654-663, 2005.
-
(2005)
STOC
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
8
-
-
57949092809
-
Kakeya sets, new mergers and old extractors
-
Z. Dvir and A. Wigderson. Kakeya sets, new mergers and old extractors. In FOCS, page, 2008.
-
FOCS
, pp. 2008
-
-
Dvir, Z.1
Wigderson, A.2
-
9
-
-
70350656836
-
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
-
S. Fehr and C. Schaffner. Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker. Arxiv preprint arXiv:0706.2606, 2007.
-
(2007)
Arxiv preprint arXiv:0706.2606
-
-
Fehr, S.1
Schaffner, C.2
-
10
-
-
35448991662
-
Exponential separations for one-way quantum communication complexity, with applications to cryptography
-
D. Gavinsky, J. Kempe, I. Kerenidis, R. Raz, and R. de Wolf. Exponential separations for one-way quantum communication complexity, with applications to cryptography. STOC, pages 516-525, 2007.
-
(2007)
STOC
, pp. 516-525
-
-
Gavinsky, D.1
Kempe, J.2
Kerenidis, I.3
Raz, R.4
de Wolf, R.5
-
11
-
-
0031504510
-
Tiny families of functions with random properties: A quality-size trade-off for hashing
-
O. Goldreich and A. Wigderson. Tiny families of functions with random properties: a quality-size trade-off for hashing. Random Structures & Algorithms, 11(4):315-343, 1997.
-
(1997)
Random Structures & Algorithms
, vol.11
, Issue.4
, pp. 315-343
-
-
Goldreich, O.1
Wigderson, A.2
-
12
-
-
34748894441
-
Unbalanced Expanders and Randomness Extractors from Parvaresh-Vardy Codes
-
V. Guruswami, C. Umans, and S. Vadhan. Unbalanced Expanders and Randomness Extractors from Parvaresh-Vardy Codes. In Computational Complexity, pages 96-108, 2007.
-
(2007)
Computational Complexity
, pp. 96-108
-
-
Guruswami, V.1
Umans, C.2
Vadhan, S.3
-
13
-
-
0002863426
-
Some estimates of the information transmitted by quantum communication channels
-
A.S. Holevo. Some estimates of the information transmitted by quantum communication channels. Problems of Information Transmission, 9:177-183, 1973.
-
(1973)
Problems of Information Transmission
, vol.9
, pp. 177-183
-
-
Holevo, A.S.1
-
14
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. Levin, and M. Luby. Pseudo-random generation from one-way functions. STOC, pages 12-24, 1989.
-
(1989)
STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.2
Luby, M.3
-
15
-
-
70350649616
-
On the Power of Quantum
-
Arxiv preprint quant-ph/0305154
-
R. Konig, U. Maurer, and R. Renner. On the Power of Quantum Memory. Arxiv preprint quant-ph/0305154, 2003.
-
(2003)
Memory
-
-
Konig, R.1
Maurer, U.2
Renner, R.3
-
16
-
-
23744435400
-
On the power of quantum memory
-
R. Konig, U. Maurer, and R. Renner. On the power of quantum memory. IEEE Transactions on Information Theory, 51(7):2391-2401, 2005.
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.7
, pp. 2391-2401
-
-
Konig, R.1
Maurer, U.2
Renner, R.3
-
18
-
-
39849104298
-
The Bounded-Storage Model in the Presence of a Quantum Adversary
-
R. Konig and B. Terhal. The Bounded-Storage Model in the Presence of a Quantum Adversary. IEEE Transactions on Information Theory, 54(2):749-762, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.2
, pp. 749-762
-
-
Konig, R.1
Terhal, B.2
-
19
-
-
0038446831
-
Extractors: Optimal up to constant factors
-
C. Lu, O. Reingold, S. Vadhan, and A. Wigderson. Extractors: Optimal up to constant factors. In STOC, pages 602-611, 2003.
-
(2003)
STOC
, pp. 602-611
-
-
Lu, C.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
20
-
-
0032606505
-
Optimal lower bounds for quantum automata and random access codes
-
A. Nayak. Optimal lower bounds for quantum automata and random access codes. In FOCS, pages 369-376, 1999.
-
(1999)
FOCS
, pp. 369-376
-
-
Nayak, A.1
-
24
-
-
0002956996
-
Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators
-
J. Radhakrishnan and A. Ta-Shma. Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators. SIAM Journal on Discrete Mathematics, 13:2, 2000.
-
(2000)
SIAM Journal on Discrete Mathematics
, vol.13
, pp. 2
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
25
-
-
33846181385
-
-
PhD thesis, Swiss Federal Institute of Technology (ETH) Zurich, September, available at
-
R. Renner. Security of Quantum Key Distribution. PhD thesis, Swiss Federal Institute of Technology (ETH) Zurich, September 2005. available at http://arxiv.org/abs/quant-ph/0512258.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
26
-
-
0032631071
-
Computing with Very Weak Random Sources
-
A. Srinivasan and D. Zuckerman. Computing with Very Weak Random Sources. SIAM Journal on Computing, 28(4):1433-1459, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1433-1459
-
-
Srinivasan, A.1
Zuckerman, D.2
-
27
-
-
0035276434
-
Pseudorandom generators without the xor lemma
-
M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the xor lemma. Journal of Computer and System Sciences, 62(2):236-266, 2001.
-
(2001)
Journal of Computer and System Sciences
, vol.62
, Issue.2
, pp. 236-266
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.3
-
28
-
-
0005314594
-
Extractors and pseudorandom generators
-
L. Trevisan. Extractors and pseudorandom generators. Journal of the ACM, pages 860-879, 2001.
-
(2001)
Journal of the ACM
, pp. 860-879
-
-
Trevisan, L.1
|