-
1
-
-
0942292954
-
Dense quantum coding and quantum finite automata
-
A. Ambainis, A. Nayak, A. Ta-Shma, and U. Vazirani. Dense quantum coding and quantum finite automata. Journal of the ACM, 49(4):496-511, 2002.
-
(2002)
Journal of the ACM
, vol.49
, Issue.4
, pp. 496-511
-
-
Ambainis, A.1
Nayak, A.2
Ta-Shma, A.3
Vazirani, U.4
-
2
-
-
0000486090
-
On the Einstein-Podolsky-Rosen paradox
-
J. S. Bell. On the Einstein-Podolsky-Rosen paradox. Physics, 1:195-200, 1964.
-
(1964)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.S.1
-
3
-
-
4243882278
-
On the problem of hidden variables in quantum theory
-
J. S. Bell. On the problem of hidden variables in quantum theory. Rev. Mod. Phys., 38:447-452, 1966.
-
(1966)
Rev. Mod. Phys.
, vol.38
, pp. 447-452
-
-
Bell, J.S.1
-
4
-
-
0021522644
-
HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13:850-864, November 1984. (Pubitemid 15510668)
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
5
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett., 23:880-884, 1969.
-
(1969)
Phys. Rev. Lett.
, vol.23
, pp. 880-884
-
-
Clauser, J.F.1
Horne, M.A.2
Shimony, A.3
Holt, R.A.4
-
9
-
-
84862634559
-
Trevisan's extractor in the presence of quantum side information
-
abs/0912.5
-
A. De, C. Portmann, R. Renner, and T. Vidick. Trevisan's extractor in the presence of quantum side information. CoRR, abs/0912.5, 2009.
-
(2009)
CoRR
-
-
De, A.1
Portmann, C.2
Renner, R.3
Vidick, T.4
-
10
-
-
77954740848
-
Near-optimal extractors against quantum storage
-
New York, NY, USA, ACM
-
A. De and T. Vidick. Near-optimal extractors against quantum storage. In Proceedings of the 42nd ACM symposium on Theory of computing, STOC '10, pages 161-170, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC '10
, pp. 161-170
-
-
De, A.1
Vidick, T.2
-
11
-
-
33947385649
-
Can quantum-mechanical description of physical reality be considered complete?
-
A. Einstein, P. Podolsky, and N. Rosen. Can quantum-mechanical description of physical reality be considered complete? Phys. Rev., 47:777-780, 1935.
-
(1935)
Phys. Rev.
, vol.47
, pp. 777-780
-
-
Einstein, A.1
Podolsky, P.2
Rosen, N.3
-
13
-
-
57849152099
-
Exponential separation for one-way quantum communication complexity, with applications to cryptography
-
Preliminary version in Proc. of STOC
-
D. Gavinsky, J. Kempe, I. Kerenidis, R. Raz, and R. de Wolf. Exponential separation for one-way quantum communication complexity, with applications to cryptography. SIAM Journal of Computing, 38(5):1695-1708, 2008. Preliminary version in Proc. of STOC 2007.
-
(2007)
SIAM Journal of Computing
, vol.38
, Issue.5
-
-
Gavinsky, D.1
Kempe, J.2
Kerenidis, I.3
Raz, R.4
De Wolf, R.5
-
14
-
-
34748894441
-
Unbalanced expanders and randomness extractors from parvaresh-vardy codes
-
Washington, DC, USA, IEEE Computer Society
-
V. Guruswami, C. Umans, and S. Vadhan. Unbalanced expanders and randomness extractors from parvaresh-vardy codes. In Proceedings of the Twenty-Second Annual IEEE Conference on Computational Complexity, CCC '07, pages 96-108, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the Twenty-Second Annual IEEE Conference on Computational Complexity, CCC '07
, pp. 96-108
-
-
Guruswami, V.1
Umans, C.2
Vadhan, S.3
-
15
-
-
0141515461
-
On the distribution of the number of roots of polynomials and explicit weak designs
-
T. Hartman and R. Raz. On the distribution of the number of roots of polynomials and explicit weak designs. Random Structures and Algorithms, 23(3):235-263, 2003.
-
(2003)
Random Structures and Algorithms
, vol.23
, Issue.3
, pp. 235-263
-
-
Hartman, T.1
Raz, R.2
-
18
-
-
69449101829
-
The operational meaning of min- and max-entropy
-
R. König, R. Renner, and C. Schaffner. The operational meaning of min- and max-entropy. IEEE Transactions on Information Theory, 55(9):4337-4347, 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.9
, pp. 4337-4347
-
-
König, R.1
Renner, R.2
Schaffner, C.3
-
19
-
-
39849104298
-
The bounded-storage model in the presence of a quantum adversary
-
DOI 10.1109/TIT.2007.913245
-
R. König and B. Terhal. The bounded storage model in presence of a quantum adversary. IEEE Transactions on Information Theory, 54(2):749-762, 2008. (Pubitemid 351314663)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.2
, pp. 749-762
-
-
Konig, R.T.1
Terhal, B.M.2
-
21
-
-
84862625364
-
Random numbers certified by Bell's theorem
-
S. Pironio, A. Acin, S. Massar, A. B. De La Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, and et al. Random numbers certified by Bell's theorem. Nature, 464(7291):10, 2009.
-
(2009)
Nature
, vol.464
, Issue.7291
, pp. 10
-
-
Pironio, S.1
Acin, A.2
Massar, S.3
De La Giroday, A.B.4
Matsukevich, D.N.5
Maunz, P.6
Olmschenk, S.7
Hayes, D.8
Luo, L.9
Manning, T.A.10
-
23
-
-
33846181385
-
-
PhD thesis, Swiss Federal Institute of Technology Zurich, Sept.
-
R. Renner. Security of Quantum Key Distribution. PhD thesis, Swiss Federal Institute of Technology Zurich, Sept. 2005.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
|