-
1
-
-
0000486090
-
On the Einstein-Podolsky-Rosen paradox
-
Bell, J.S.: On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200 (1964)
-
(1964)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.S.1
-
3
-
-
4244023347
-
Communication via one- and two-particle operators on Einstein-Podolsky- Rosen states
-
Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69(20), 2881-2884 (1992)
-
(1992)
Phys. Rev. Lett.
, vol.69
, Issue.20
, pp. 2881-2884
-
-
Bennett, C.H.1
Wiesner, S.J.2
-
4
-
-
33746365070
-
More on the sum-product phenomenon in prime fields and its applications
-
Bourgain, J.: More on the sum-product phenomenon in prime fields and its applications. IJNT 1(1), 1-32 (2005)
-
(2005)
IJNT
, vol.1
, Issue.1
, pp. 1-32
-
-
Bourgain, J.1
-
5
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230-261 (1988)
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
6
-
-
84961364322
-
Quantum entanglement and the communication complexity of the inner product function
-
Williams, C.P. (ed.) QCQC 1998 Springer, Heidelberg
-
Cleve, R., van Dam, W., Nielsen, M., Tapp, A.: Quantum entanglement and the communication complexity of the inner product function. In: Williams, C.P. (ed.) QCQC 1998. LNCS, vol. 1509, pp. 61-74. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1509
, pp. 61-74
-
-
Cleve, R.1
Van Dam, W.2
Nielsen, M.3
Tapp, A.4
-
7
-
-
77954746955
-
-
CoRR abs/0912.5514
-
De, A., Portmann, C., Vidick, T., Renner, R.: Trevisan's extractor in the presence of quantum side information. CoRR abs/0912.5514 (2009)
-
(2009)
Trevisan's Extractor in the Presence of Quantum Side Information
-
-
De, A.1
Portmann, C.2
Vidick, T.3
Renner, R.4
-
8
-
-
78149355828
-
Near-optimal extractors against quantum storage
-
to appear
-
De, A., Vidick, T.: Near-optimal extractors against quantum storage. In: Proc. of STOC (2010) (to appear)
-
Proc. of STOC (2010)
-
-
De, A.1
Vidick, T.2
-
9
-
-
20544433132
-
Improved randomness extraction from two independent sources
-
Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) RANDOM 2004 and APPROX 2004 Springer, Heidelberg
-
Dodis, Y., Elbaz, A., Oliveira, R., Raz, R.: Improved randomness extraction from two independent sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) RANDOM 2004 and APPROX 2004. LNCS, vol. 3122, pp. 334-344. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3122
, pp. 334-344
-
-
Dodis, Y.1
Elbaz, A.2
Oliveira, R.3
Raz, R.4
-
10
-
-
30744451262
-
On extracting private randomness over a public channel
-
Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003 Springer, Heidelberg
-
Dodis, Y., Oliveira, R.: On extracting private randomness over a public channel. In: Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003. LNCS, vol. 2764, pp. 252-263. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2764
, pp. 252-263
-
-
Dodis, Y.1
Oliveira, R.2
-
11
-
-
40249085721
-
Randomness extraction via delta-biased masking in the presence of a quantum attacker
-
Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
-
Fehr, S., Schaffner, C.: Randomness extraction via delta-biased masking in the presence of a quantum attacker. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 465-481. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 465-481
-
-
Fehr, S.1
Schaffner, C.2
-
12
-
-
57849152099
-
Exponential separation for one-way quantum communication complexity, with applications to cryptography
-
Gavinsky, D., Kempe, J., Kerenidis, I., Raz, R., deWolf, R.: Exponential separation for one-way quantum communication complexity, with applications to cryptography. SIAM J. Comput. 38(5), 1695-1708 (2008)
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.5
, pp. 1695-1708
-
-
Gavinsky, D.1
Kempe, J.2
Kerenidis, I.3
Raz, R.4
DeWolf, R.5
-
13
-
-
67650118855
-
Bounded-error quantum state identification and exponential separations in communication complexity
-
Gavinsky, D., Kempe, J., Regev, O., de Wolf, R.: Bounded-error quantum state identification and exponential separations in communication complexity. SIAM J. Comput. 39(1), 1-24 (2009)
-
(2009)
SIAM J. Comput.
, vol.39
, Issue.1
, pp. 1-24
-
-
Gavinsky, D.1
Kempe, J.2
Regev, O.3
De Wolf, R.4
-
14
-
-
34247496907
-
Strengths and weaknesses of quantum fingerprinting
-
Gavinsky, D., Kempe, J., de Wolf, R.: Strengths and weaknesses of quantum fingerprinting. In: Proc. of CCC, pp. 288-298 (2006)
-
(2006)
Proc. of CCC
, pp. 288-298
-
-
Gavinsky, D.1
Kempe, J.2
De Wolf, R.3
-
15
-
-
30744456117
-
Three xor-lemmas - An exposition
-
Goldreich, O.: Three xor-lemmas - an exposition. ECCC 2(56) (1995)
-
(1995)
ECCC
, vol.2
, Issue.56
-
-
Goldreich, O.1
-
16
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
extended abstracts.
-
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions (extended abstracts). In: Proc. of STOC, pp. 12-24 (1989)
-
(1989)
Proc. of STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
17
-
-
77952399265
-
2-source extractors under computational assumptions and cryptography with defective randomness
-
Kalai, Y.T., Li, X., Rao, A.: 2-source extractors under computational assumptions and cryptography with defective randomness. In: Proc. of FOCS, pp. 617-626 (2009)
-
(2009)
Proc. of FOCS
, pp. 617-626
-
-
Kalai, Y.T.1
Li, X.2
Rao, A.3
-
19
-
-
23744435400
-
On the power of quantum memory
-
König, R., Maurer, U.M., Renner, R.: On the power of quantum memory. IEEE Trans. Inform. Theory 51(7), 2391-2401 (2005)
-
(2005)
IEEE Trans. Inform. Theory
, vol.51
, Issue.7
, pp. 2391-2401
-
-
König, R.1
Maurer, U.M.2
Renner, R.3
-
20
-
-
39849104298
-
The bounded-storage model in the presence of a quantum adversary
-
König, R.T., Terhal, B.M.: The bounded-storage model in the presence of a quantum adversary. IEEE Trans. Inform. Theory 54(2), 749-762 (2008)
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.2
, pp. 749-762
-
-
König, R.T.1
Terhal, B.M.2
-
21
-
-
33745190462
-
Limits on the ability of quantum states to convey classical messages
-
Nayak, A., Salzman, J.: Limits on the ability of quantum states to convey classical messages. Journal of the ACM 53(1), 184-206 (2006)
-
(2006)
Journal of the ACM
, vol.53
, Issue.1
, pp. 184-206
-
-
Nayak, A.1
Salzman, J.2
-
23
-
-
34848882226
-
Extractors with weak random seeds
-
Raz, R.: Extractors with weak random seeds. In: Proc. of STOC, pp. 11-20 (2005)
-
(2005)
Proc. of STOC
, pp. 11-20
-
-
Raz, R.1
-
25
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
Kilian, J. (ed.) TCC 2005 Springer, Heidelberg
-
Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407-425. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 407-425
-
-
Renner, R.1
König, R.2
-
26
-
-
0021546972
-
Generating quasi-random sequences from slightly-random sources
-
extended abstract.
-
Santha, M., Vazirani, U.V.: Generating quasi-random sequences from slightly-random sources (extended abstract). In: Proc. of FOCS, pp. 434-440 (1984)
-
(1984)
Proc. of FOCS
, pp. 434-440
-
-
Santha, M.1
Vazirani, U.V.2
-
27
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of the EATCS 77, 67-95 (2002)
-
(2002)
Bulletin of the EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
28
-
-
70350689920
-
Short seed extractors against quantum storage
-
Ta-Shma, A.: Short seed extractors against quantum storage. In: Proc. of STOC, pp. 401-408 (2009)
-
(2009)
Proc. of STOC
, pp. 401-408
-
-
Ta-Shma, A.1
-
29
-
-
77955669047
-
Leftover hashing against quantum side information
-
to appear
-
Tomamichel, M., Schaffner, C., Smith, A., Renner, R.: Leftover hashing against quantum side information. In: Proc. of ISIT (to appear, 2010)
-
(2010)
Proc. of ISIT
-
-
Tomamichel, M.1
Schaffner, C.2
Smith, A.3
Renner, R.4
-
30
-
-
0005314594
-
Extractors and pseudorandom generators
-
Trevisan, L.: Extractors and pseudorandom generators. Journal of the ACM 48(4), 860-879 (2001)
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 860-879
-
-
Trevisan, L.1
-
31
-
-
51249175241
-
Strong communication complexity or generating quasirandom sequences form two communicating semi-random sources
-
Vazirani, U.V.: Strong communication complexity or generating quasirandom sequences form two communicating semi-random sources. Combinatorica 7(4), 375-392 (1987)
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 375-392
-
-
Vazirani, U.V.1
-
32
-
-
78149345969
-
-
Personal communication
-
de Wolf, R.: Personal communication (2010)
-
(2010)
-
-
De Wolf, R.1
-
33
-
-
0020301290
-
Theory and applications of trapdoor functions
-
extended abstract
-
Yao, A.C.C.: Theory and applications of trapdoor functions (extended abstract). In: Proc. of FOCS, pp. 80-91 (1982)
-
(1982)
Proc. of FOCS
, pp. 80-91
-
-
Yao, A.C.C.1
-
34
-
-
0025564929
-
General weak random sources
-
Zuckerman, D.: General weak random sources. In: Proc. of FOCS, pp. 534-543 (1990)
-
(1990)
Proc. of FOCS
, pp. 534-543
-
-
Zuckerman, D.1
|