-
1
-
-
0032631760
-
Dense quantum coding and a lower bound for 1-way quantum automata
-
presented at the, arXiv:quant-ph/ 9804043
-
A. Ambainis, A. Nayak, A. Ta-Shma, and U.Vazirani, "Dense quantum coding and a lower bound for 1-way quantum automata," presented at the 31st ACM Symp. Theory of Computing, 1999, arXiv:quant-ph/ 9804043.
-
(1999)
31st ACM Symp. Theory of Computing
-
-
Ambainis, A.1
Nayak, A.2
Ta-Shma, A.3
Vazirani, U.4
-
2
-
-
20744451398
-
Near-independence of permutations and an almost sure polynomial bound on the diameter of the symmetric group
-
Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms
-
L. Babai and T. P. Hayes, "Near-independence of permutations and an almost sure polynomial bound on the diameter of the symmetric group," in Proc. 16th Annu. ACM-SIAM Symp. Discrete Algorithms, SODA'05, Philadelphia, PA, 2005, pp. 1057-1066, Society for Industrial and Applied Mathematics. (Pubitemid 40851473)
-
(2005)
Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 1057-1066
-
-
Babai, L.1
Hayes, T.P.2
-
3
-
-
57949116863
-
A hypercontractive inequality for matrix-valued functions with applications to quantum computing and ldcs
-
Oct.
-
A. Ben-Aroya, O. Regev, and R. de Wolf, "A hypercontractive inequality for matrix-valued functions with applications to quantum computing and ldcs," Found. Comput. Sci., pp. 477-486, Oct. 2008.
-
(2008)
Found. Comput. Sci.
, pp. 477-486
-
-
Ben-Aroya, A.1
Regev, O.2
De Wolf, R.3
-
4
-
-
0029405656
-
Generalized privacy amplification
-
Jun.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Jun. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
5
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
6
-
-
66949151794
-
Min- and max-relative entropies and a new entanglement monotone
-
Jun.
-
N. Datta, "Min- and max-relative entropies and a new entanglement monotone," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2816-2826, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2816-2826
-
-
Datta, N.1
-
8
-
-
0001918661
-
La prévision: Ses lois logiques ses sources subjectives
-
B. de Finetti, "La prévision: ses lois logiques, ses sources subjectives," Ann. Inst. H. Poincaré, vol. 7, pp. 1-68, 1937.
-
(1937)
Ann. Inst. H. Poincaré
, vol.7
, pp. 1-68
-
-
De Finetti, B.1
-
9
-
-
0001740680
-
Finite exchangeable sequences
-
P. Diaconis and D. Freedman, "Finite exchangeable sequences," Ann. Probab., vol. 8, no. 4, pp. 745-764, 1980.
-
(1980)
Ann. Probab.
, vol.8
, Issue.4
, pp. 745-764
-
-
Diaconis, P.1
Freedman, D.2
-
10
-
-
35048840744
-
Constant-round oblivious transfer in the bounded storage mode l
-
Y. Z. Ding, D. Harnik, A. Rosen, and R. Shaltiel, "Constant-round oblivious transfer in the bounded storage mode l," in Proc. 2nd Theory of Cryptography Conf., TCC 2004, 2004, pp. 446-472.
-
(2004)
Proc. 2nd Theory of Cryptography Conf., TCC
, vol.2004
, pp. 446-472
-
-
Ding, Y.Z.1
Harnik, D.2
Rosen, A.3
Shaltiel, R.4
-
12
-
-
4344699394
-
Optimal randomizer efficiency in the bounded-storage model
-
Jan., Conference version appeared in Proc. STOC'02
-
S. Dziembowski and U. Maurer, "Optimal randomizer efficiency in the bounded-storage model," J. Cryptol., vol. 17, no. 1, pp. 5-26, Jan. 2004, Conference version appeared in Proc. STOC'02.
-
(2004)
J. Cryptol.
, vol.17
, Issue.1
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
13
-
-
40249085721
-
Randomness extraction via delta-biased masking in the presence of a quantum attacker
-
Berlin/Heidelberg, Germany: Springer
-
S. Fehr and C. Schaffner, "Randomness extraction via delta-biased masking in the presence of a quantum attacker," in Theory of Cryptograph (TCC), Lecture Notes in Computer Science. Berlin/Heidelberg, Germany: Springer, 2008, vol. 4948, pp. 465-481.
-
(2008)
Theory of Cryptograph (TCC), Lecture Notes in Computer Science
, vol.4948
, pp. 465-481
-
-
Fehr, S.1
Schaffner, C.2
-
14
-
-
57849152099
-
-
Philadelphia PA: SIAM, Dec., arXiv:quant-ph/0611209
-
D. Gavinsky, J. Kempe, I. Kerenidis, R. Raz, and R. deWolf, Exponential Separations for One-Way Quantum Communication Complexity, With Applications to Cryptography. Philadelphia, PA: SIAM, Dec. 2008, vol. 38, pp. 1695-1708, arXiv:quant-ph/0611209.
-
(2008)
Exponential Separations for One-Way Quantum Communication Complexity, with Applications to Cryptography
, vol.38
, pp. 1695-1708
-
-
Gavinsky, D.1
Kempe, J.2
Kerenidis, I.3
Raz, R.4
De Wolf, R.5
-
16
-
-
0011767018
-
Statistical problems in quantum physics
-
Springer, Lecture Notes in Mathematics
-
A. S. Holevo, "Statistical problems in quantum physics," in Proc. 2nd Japan-USSR Symp. Probability Theory, 1973, pp. 104-119, Springer, Lecture Notes in Mathematics.
-
(1973)
Proc. 2nd Japan-USSR Symp. Probability Theory
, pp. 104-119
-
-
Holevo, A.S.1
-
17
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
New York, ACM
-
R. Impagliazzo, L. A. Levin, and M. Luby, "Pseudo-random generation from one-way functions," in Proc. 21st Annu. ACM Symp. Theory of Computing STOC'89, New York, 1989, pp. 12-24, ACM.
-
(1989)
Proc. 21st Annu. ACM Symp. Theory of Computing STOC'89
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
18
-
-
23744435400
-
On the power of quantum memory
-
DOI 10.1109/TIT.2005.850087
-
R. König, U. Maurer, and R. Renner, "On the power of quantum memory," IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2391-2401, Jul. 2005, arXiv:quant-ph/0305154. (Pubitemid 41136399)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.7
, pp. 2391-2401
-
-
Konig, R.1
Maurer, U.2
Renner, R.3
-
19
-
-
69449101829
-
The operational meaning of conditional min-entropy
-
Sep.
-
R. König, C. Schaffner, and R. Renner, "The operational meaning of conditional min-entropy," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4337-4347, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4337-4347
-
-
König, R.1
Schaffner, C.2
Renner, R.3
-
20
-
-
39849104298
-
The bounded-storage model in the presence of a quantum adversary
-
DOI 10.1109/TIT.2007.913245
-
R. König and B. M. Terhal, "The bounded storage model in the presence of a quantum adversary," IEEE Trans. Inf. Theory, vol. 54, no. 2, pp. 749-762, Feb. 2008. (Pubitemid 351314663)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.2
, pp. 749-762
-
-
Konig, R.T.1
Terhal, B.M.2
-
22
-
-
33947642202
-
Conditional density operators and the subjectivity of quantum operations
-
G. Adenier, C. A. Fuchs, and A. Yu. Khrennikov, Eds., arXiv:quant-ph/0611233
-
M. S. Leifer, "Conditional density operators and the subjectivity of quantum operations," in Proc. Foundations of Probability and Physics-4, AIP Conf., G. Adenier, C. A. Fuchs, and A. Yu. Khrennikov, Eds., 2007, vol. 889, pp. 172-186, arXiv:quant-ph/0611233.
-
(2007)
Proc. Foundations of Probability and Physics-4 AIP Conf.
, vol.889
, pp. 172-186
-
-
Leifer, M.S.1
-
23
-
-
79959543094
-
-
arXiv:0809.2252v2
-
A. Leverrier, E. Karpov, P. Grangier, and N. J. Cerf, Unconditional Security of Continuous-Variable Quantum Key Distribution, 2008, arXiv:0809.2252v2.
-
(2008)
Unconditional Security of Continuous-Variable Quantum Key Distribution
-
-
Leverrier, A.1
Karpov, E.2
Grangier, P.3
Cerf, N.J.4
-
24
-
-
26844485031
-
Hyper-encryption against space-bounded adversaries from on-line strong extractors
-
Springer, Lecture Notes in Computer Science
-
C. Lu, "Hyper-encryption against space-bounded adversaries from on-line strong extractors," in Proc. Advances in Cryptology-CRYPTO 2003, 2002, pp. 18-22, Springer, Lecture Notes in Computer Science.
-
(2002)
Proc. Advances in Cryptology-CRYPTO 2003
, pp. 18-22
-
-
Lu, C.1
-
25
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. Maurer, "Conditionally-perfect secrecy and a provably-secure randomized cipher," J. Cryptol., vol. 5, no. 1, pp. 53-66, 1992.
-
(1992)
J. Cryptol.
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
27
-
-
0030086632
-
Randomness is linear in space
-
DOI 10.1006/jcss.1996.0004
-
N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comput. Syst. Sci., vol. 52, pp. 43-52, 1996, A preliminary version appeared at STOC'93. (Pubitemid 126340848)
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
29
-
-
33846181385
-
-
Ph.D. dissertation ETH, Zurich, Switzerland, arXiv:quant-ph/0512258
-
R. Renner, "Security of QuantumKey Distribution," Ph.D. dissertation, ETH, Zurich, Switzerland, 2005, arXiv:quant-ph/0512258.
-
(2005)
Security of QuantumKey Distribution
-
-
Renner, R.1
-
30
-
-
34548394977
-
Symmetry of large physical systems implies independence of subsystems
-
R. Renner, "Symmetry of large physical systems implies independence of subsystems," Nature Phys., vol. 3, pp. 645-649, 2007.
-
(2007)
Nature Phys.
, vol.3
, pp. 645-649
-
-
Renner, R.1
-
31
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
R. Renner and R. König, "Universally composable privacy amplification against quantum adversaries," in Proc. 2nd Theory of Cryptography Conf. TCC, 2005, pp. 407-425, Volume 3378 of Lecture Notes in Computer Science, Springer, arXiv:quant-ph/0403133. (Pubitemid 41231175)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 407-425
-
-
Renner, R.1
Konig, R.2
-
32
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
[Online]. Available:
-
R. Shaltiel, "Recent developments in explicit constructions of extractors," Bull. EATCS vol. 77, pp. 67-95, 2002 [Online]. Available: http://dblp.uni-trier.de
-
(2002)
Bull. EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
35
-
-
44949188319
-
Cryptography from noisy storage
-
S. Wehner, C. Schaffner, and B. M. Terhal, "Cryptography from noisy storage," Phys. Rev. Lett., vol. 100, no. 220502, 2008.
-
(2008)
Phys. Rev. Lett.
, vol.100
, pp. 220502
-
-
Wehner, S.1
Schaffner, C.2
Terhal, B.M.3
-
36
-
-
0033316798
-
Coding theorem and strong converse for quantum channels
-
DOI 10.1109/18.796385
-
A. Winter, "Coding theorem and strong converse for quantum channels," IEEE Trans. Inf. Theory, vol. 45, no. 7, pp. 2481-2485, Nov. 1999. (Pubitemid 30514205)
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.7
, pp. 2481-2485
-
-
Winter, A.1
-
37
-
-
38049160265
-
Oblivious-transfer amplification
-
J.Wullschleger, "Oblivious-transfer amplification," in Proc. LNCS, Advances in Cryptology-EUROCRYPT, 2007, vol. 4515, pp. 555-572.
-
(2007)
Proc. LNCS, Advances in Cryptology-EUROCRYPT
, vol.4515
, pp. 555-572
-
-
Wullschleger, J.1
|