-
1
-
-
0942292954
-
Dense quantum coding and quantum finite automata
-
A. Ambainis, A. Nayak, A. Ta-shma, and U. V. Vazirani. Dense quantum coding and quantum finite automata. Journal of the ACM, 49(4):496-511, 2002.
-
(2002)
Journal of the ACM
, vol.49
, Issue.4
, pp. 496-511
-
-
Ambainis, A.1
Nayak, A.2
Ta-Shma, A.3
Vazirani, U.V.4
-
2
-
-
77954699207
-
-
Preliminary version in
-
Preliminary version in Proc. of STOC 1999.
-
Proc. of STOC 1999
-
-
-
3
-
-
57949116863
-
A Hypercontractive Inequality for Matrix-Valued Functions with Applications to Quantum Computing and LDCs
-
Full version at arXiv:0705.3806
-
A. Ben-Aroya, O. Regev, and R. de Wolf. A Hypercontractive Inequality for Matrix-Valued Functions with Applications to Quantum Computing and LDCs . In Proceedings of the 49th IEEE Symposium on Foundations of Computer Science, pages 477-486, 2008. Full version at arXiv:0705.3806.
-
(2008)
Proceedings of the 49th IEEE Symposium on Foundations of Computer Science
, pp. 477-486
-
-
Ben-Aroya, A.1
Regev, O.2
De Wolf, R.3
-
4
-
-
84961364322
-
Quantum entanglement and the communication complexity of the inner product function
-
London, UK, Springer-Verlag
-
R. Cleve, W. v. Dam, M. Nielsen, and A. Tapp. Quantum entanglement and the communication complexity of the inner product function. In QCQC '98: Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications, pages 61-74, London, UK, 1998. Springer-Verlag.
-
(1998)
QCQC '98: Selected Papers from the First NASA International Conference on Quantum Computing and Quantum Communications
, pp. 61-74
-
-
Cleve, R.1
Dam, W.V.2
Nielsen, M.3
Tapp, A.4
-
6
-
-
70350589607
-
Extractors using hardness amplification
-
A. De and L. Trevisan. Extractors using hardness amplification. In Proc. of APPROX-RANDOM, pages 462-475, 2009.
-
(2009)
Proc. of APPROX-RANDOM
, pp. 462-475
-
-
De, A.1
Trevisan, L.2
-
7
-
-
4344699394
-
Optimal randomizer efficiency in the bounded-storage model
-
S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5-26, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
8
-
-
40249085721
-
Randomness extraction via delta -biased masking in the presence of a quantum attacker
-
R. Canetti, editor, TCC, Springer
-
S. Fehr and C. Schaffner. Randomness extraction via delta -biased masking in the presence of a quantum attacker. In R. Canetti, editor, TCC, volume 4948 of Lecture Notes in Computer Science, pages 465-481. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4948
, pp. 465-481
-
-
Fehr, S.1
Schaffner, C.2
-
9
-
-
57849152099
-
Exponential separation for one-way quantum communication complexity, with applications to cryptography
-
D. Gavinsky, J. Kempe, I. Kerenidis, R. Raz, and R. de Wolf. Exponential separation for one-way quantum communication complexity, with applications to cryptography. SIAM Journal of Computing, 38(5):1695-1708, 2008.
-
(2008)
SIAM Journal of Computing
, vol.38
, Issue.5
, pp. 1695-1708
-
-
Gavinsky, D.1
Kempe, J.2
Kerenidis, I.3
Raz, R.4
De Wolf, R.5
-
10
-
-
77954722026
-
-
Preliminary version in
-
Preliminary version in Proc. of STOC 2007.
-
Proc. of STOC 2007
-
-
-
11
-
-
0036567053
-
Combinatorial bounds for list decoding
-
V. Guruswami, J. Håstad, M. Sudan, and D. Zuckerman. Combinatorial bounds for list decoding. IEEE Transactions on Information Theory, 48(5):1021-1034, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.5
, pp. 1021-1034
-
-
Guruswami, V.1
Håstad, J.2
Sudan, M.3
Zuckerman, D.4
-
12
-
-
0141515461
-
On the distribution of the number of roots of polynomials and explicit weak designs
-
T. Hartman and R. Raz. On the distribution of the number of roots of polynomials and explicit weak designs. Random Structures and Algorithms, 23(3):235-263, 2003.
-
(2003)
Random Structures and Algorithms
, vol.23
, Issue.3
, pp. 235-263
-
-
Hartman, T.1
Raz, R.2
-
13
-
-
0002455537
-
Information-theoretic aspects of quantum measurement
-
A. Holevo. Information-theoretic aspects of quantum measurement. Problems of Information Transmission, 9(2):31-42, 1973.
-
(1973)
Problems of Information Transmission
, vol.9
, Issue.2
, pp. 31-42
-
-
Holevo, A.1
-
15
-
-
23744435400
-
On the power of quantum memory
-
R. König, U. Maurer, and R. Renner. On the power of quantum memory. IEEE Transactions on Information Theory, 51(7):2391-2401, 2005.
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.7
, pp. 2391-2401
-
-
König, R.1
Maurer, U.2
Renner, R.3
-
16
-
-
39849104298
-
The bounded storage model in presence of a quantum adversary
-
R. König and B. Terhal. The bounded storage model in presence of a quantum adversary. IEEE Transactions on Information Theory, 54(2):749-762, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.2
, pp. 749-762
-
-
König, R.1
Terhal, B.2
-
17
-
-
4344636292
-
Encryption against storage-bounded adversaries from on-line strong extractors
-
C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, 17(1):27-42, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 27-42
-
-
Lu, C.-J.1
-
18
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. M. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.M.1
-
19
-
-
33745190462
-
Limits on the ability of quantum states to convey classical messages
-
A. Nayak and J. Salzman. Limits on the ability of quantum states to convey classical messages. Journal of the ACM, 53(1):184-206, 2006.
-
(2006)
Journal of the ACM
, vol.53
, Issue.1
, pp. 184-206
-
-
Nayak, A.1
Salzman, J.2
-
21
-
-
77954726331
-
-
Preliminary version in
-
Preliminary version in Proc. of FOCS'88.
-
Proc. of FOCS'88
-
-
-
22
-
-
0038309373
-
Extracting all the randomness and reducing the error in trevisan's extractors
-
R. Raz, O. Reingold, and S. P. Vadhan. Extracting all the randomness and reducing the error in trevisan's extractors. J. Comput. Syst. Sci., 65(1):97-128, 2002.
-
(2002)
J. Comput. Syst. Sci.
, vol.65
, Issue.1
, pp. 97-128
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.P.3
-
23
-
-
77954699207
-
-
Preliminary version in
-
Preliminary version in Proc. of STOC 1999.
-
Proc. of STOC 1999
-
-
-
24
-
-
0035276434
-
Pseudorandom generators without the XOR lemma
-
M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the XOR lemma. Journal of Computer and System Sciences, 62(2):236-266, 2001.
-
(2001)
Journal of Computer and System Sciences
, vol.62
, Issue.2
, pp. 236-266
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.3
-
25
-
-
77954735405
-
-
Preliminary version in
-
Preliminary version in STOC and CCC 1999.
-
STOC and CCC 1999
-
-
-
27
-
-
0005314594
-
Extractors and pseudorandom generators
-
L. Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4):860-879, 2001.
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 860-879
-
-
Trevisan, L.1
-
28
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43-77, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
29
-
-
15244355932
-
The complexity of constructing pseudorandom generators from hard functions
-
DOI 10.1007/s00037-004-0187-1
-
E. Viola. The complexity of constructing pseudorandom generators from hard functions. Computational Complexity, 13(3-4):147-188, 2004. (Pubitemid 40389759)
-
(2005)
Computational Complexity
, vol.13
, Issue.3-4
, pp. 147-188
-
-
Viola, E.1
|