-
1
-
-
0032631760
-
Dense quantum coding and a lower bound for 1-way quantum automata
-
ACM, New York
-
A. AMBAINIS, A. NAYAK, A. TA-SHMA, and U. VAZIRANI, Dense quantum coding and a lower bound for 1-way quantum automata, in Proceedings of the 31st Symposium on Theory of Computing (STOC'99), ACM, New York, 1999, pp. 376-383.
-
(1999)
Proceedings of the 31st Symposium on Theory of Computing (STOC'99)
, pp. 376-383
-
-
Ambainis, A.1
Nayak, A.2
Ta-Shma, A.3
Vazirani, U.4
-
2
-
-
84855970021
-
Better short-seed quantum-proof extractors
-
A. BEN-AROYA and A. TA-SHMA, Better short-seed quantum-proof extractors, Theoret. Comput. Sci., 419(2012), pp. 17-25.
-
(2012)
Theoret. Comput. Sci.
, vol.419
, pp. 17-25
-
-
Ben-Aroya, A.1
Ta-Shma, A.2
-
3
-
-
0029405656
-
Generalized privacy amplification
-
C. H. BENNETT, G. BRASSARD, C. CRÉPEAU, and U. MAURER, Generalized privacy amplification, IEEE Trans. Inform. Theory, 41(1995), pp. 1915-1923.
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. BENNETT, G. BRASSARD, and J.-M. ROBERT, Privacy amplification by public discussion, SIAM J. Comput., 17(1988), pp. 210-229.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
5
-
-
77954740848
-
Near-optimal extractors against quantum storage
-
ACM, New York
-
A. DE and T. VIDICK, Near-optimal extractors against quantum storage, in Proceedings of the 42nd Symposium on Theory of Computing (STOC'10), ACM, New York, 2010, pp. 161-170
-
(2010)
Proceedings of the 42nd Symposium on Theory of Computing (STOC'10)
, pp. 161-170
-
-
De, A.1
Vidick, T.2
-
6
-
-
35448991662
-
Exponential separations for one-way quantum communication complexity, with applications to cryptography
-
DOI 10.1145/1250790.1250866, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
D. GAVINSKY, J. KEMPE, I. KERENIDIS, R. RAZ, and R. DE WOLF, Exponential separations for one-way quantum communication complexity, with applications to cryptography, in Proceedings of the 39th Symposium on Theory of Computing (STOC'07), ACM, New York, 2007, pp. 516-525. (Pubitemid 47630771)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 516-525
-
-
Gavinsky, D.1
Kempe, J.2
Kerenidis, I.3
Raz, R.4
De Wolf, R.5
-
7
-
-
0036567053
-
Combinatorial bounds for list decoding
-
DOI 10.1109/18.995539, PII S0018944802027943
-
V. GURUSWAMI, J. HÅSTAD, M. SUDAN, and D. ZUCKERMAN, Combinatorial bounds for list decoding, IEEE Trans. Inform. Theory, 48(2002), pp. 1021-1034. (Pubitemid 34555215)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.5
, pp. 1021-1034
-
-
Guruswami, V.1
Hastad, J.2
Sudan, M.3
Zuckerman, D.4
-
8
-
-
0141515461
-
On the distribution of the number of roots of polynomials and explicit weak designs
-
T. HARTMAN and R. RAZ, On the distribution of the number of roots of polynomials and explicit weak designs, Random Structures Algorithms, 23(2003), pp. 235-263.
-
(2003)
Random Structures Algorithms
, vol.23
, pp. 235-263
-
-
Hartman, T.1
Raz, R.2
-
9
-
-
0033692219
-
Extractors and pseudo-random generators with optimal seed length
-
ACM, New York
-
R. IMPAGLIAZZO, R. SHALTIEL, and A. WIGDERSON, Extractors and pseudo-random generators with optimal seed length, in Proceedings of the 32nd Symposium on Theory of Computing (STOC'00), ACM, New York, 2000, pp. 1-10.
-
(2000)
Proceedings of the 32nd Symposium on Theory of Computing (STOC'00)
, pp. 1-10
-
-
Impagliazzo, R.1
Shaltiel, R.2
Wigderson, A.3
-
11
-
-
78149293231
-
Two-source extractors secure against quantum adversaries
-
Springer, New York
-
R. KASHER and J. KEMPE, Two-source extractors secure against quantum adversaries, in Proceedings of the International Conference on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM'10), Springer, New York, 2010, pp. 656-669.
-
(2010)
Proceedings of the International Conference on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM'10)
, pp. 656-669
-
-
Kasher, R.1
Kempe, J.2
-
12
-
-
79959564588
-
Sampling of min-entropy relative to quantum knowledge
-
R. KÖNIG and R. RENNER, Sampling of min-entropy relative to quantum knowledge, IEEE Trans. Inform. Theory, 57(2011), pp. 4760-4787.
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, pp. 4760-4787
-
-
König, R.1
Renner, R.2
-
13
-
-
69449101829
-
The operational meaning of min-and max-entropy
-
R. KÖNIG, R. RENNER, and C. SCHAFFNER, The operational meaning of min-and max-entropy, IEEE Trans. Inform. Theory, 55(2009), pp. 4337-4347.
-
(2009)
IEEE Trans. Inform. Theory
, vol.55
, pp. 4337-4347
-
-
König, R.1
Renner, R.2
Schaffner, C.3
-
14
-
-
39849104298
-
The bounded-storage model in the presence of a quantum adversary
-
DOI 10.1109/TIT.2007.913245
-
R. KÖNIG and B. M. TERHAL, The bounded-storage model in the presence of a quantum adversary, IEEE Trans. Inform. Theory, 54(2008), pp. 749-762. (Pubitemid 351314663)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.2
, pp. 749-762
-
-
Konig, R.T.1
Terhal, B.M.2
-
15
-
-
4344636292
-
Encryption against storage-bounded adversaries from on-line strong extractors
-
C.-J. LU, Encryption against storage-bounded adversaries from on-line strong extractors, J. Cryptol., 17(2004), pp. 27-42.
-
(2004)
J. Cryptol.
, vol.17
, pp. 27-42
-
-
Lu, C.-J.1
-
16
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. M. MAURER, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, 5(1992), pp. 53-66.
-
(1992)
Journal of Cryptology
, vol.5
, pp. 53-66
-
-
Maurer, U.M.1
-
19
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
J. RADHAKRISHNAN and A. TA-SHMA, Bounds for dispersers, extractors, and depth-two superconcentrators, SIAM J. Discrete Math., 13(2000), pp. 2-24.
-
(2000)
SIAM J. Discrete Math.
, vol.13
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
20
-
-
34848882226
-
Extractors with weak random seeds
-
DOI 10.1145/1060590.1060593, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
R. RAZ, Extractors with weak random seeds, in Proceedings of the 37th Symposium on Theory of Computing (STOC'05), ACM, New York, 2005, pp. 11-20. (Pubitemid 43098567)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 11-20
-
-
Raz, R.1
-
21
-
-
0038309373
-
Extracting all the randomness and reducing the error in Trevisan's extractors
-
DOI 10.1006/jcss.2002.1824
-
R. RAZ, O. REINGOLD, and S. VADHAN, Extracting all the randomness and reducing the error in Trevisan's extractors, J. Comput. System Sci., 65(2002), pp. 97-128. (Pubitemid 41161760)
-
(2003)
Journal of Computer and System Sciences
, vol.65
, Issue.1
, pp. 97-128
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
22
-
-
33846181385
-
-
Ph. D. thesis, Department of Computer Science, Swiss Federal Institute of Technology Zurich, Zurich
-
R. RENNER, Security of Quantum Key Distribution, Ph. D. thesis, Department of Computer Science, Swiss Federal Institute of Technology Zurich, Zurich, 2005.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
23
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
R. SHALTIEL, Recent developments in explicit constructions of extractors, Bull. European Assoc. Theoret. Comput. Sci., 77(2002), pp. 67-95.
-
(2002)
Bull. European Assoc. Theoret. Comput. Sci.
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
24
-
-
27844593208
-
Simple extractors for all min-entropies and a new pseudorandom generator
-
DOI 10.1145/1059513.1059516
-
R. SHALTIEL and C. UMANS, Simple extractors for all min-entropies and a new pseudorandom generator, J. ACM, 52(2005), pp. 172-216. (Pubitemid 41655758)
-
(2005)
Journal of the ACM
, vol.52
, Issue.2
, pp. 172-216
-
-
Shaltiel, R.1
Umans, C.2
-
25
-
-
84866367728
-
-
Master's thesis, Department of Physics, Swiss Federal Institute of Technology, Zurich
-
R. SOLCAÀ, Efficient Simulation of Random Quantum States and Operators, Master's thesis, Department of Physics, Swiss Federal Institute of Technology, Zurich, 2010.
-
(2010)
Efficient Simulation of Random Quantum States and Operators
-
-
Solcaà, R.1
-
26
-
-
0032631071
-
Computing with very weak random sources
-
A. SRINIVASAN and D. ZUCKERMAN, Computing with very weak random sources, SIAM J. Comput., 28(1999), pp. 1433-1459.
-
(1999)
SIAM J. Comput.
, vol.28
, pp. 1433-1459
-
-
Srinivasan, A.1
Zuckerman, D.2
-
27
-
-
0002482317
-
List decoding: Algorithms and applications
-
M. SUDAN, List decoding: Algorithms and applications, SIGACT News, 31(2000), pp. 16-27.
-
(2000)
SIGACT News
, vol.31
, pp. 16-27
-
-
Sudan, M.1
-
29
-
-
0034832181
-
Loss-less condensers, unbalanced expanders, and extractors
-
A. TA-SHMA, C. UMANS, and D. ZUCKERMAN, Loss-less condensers, unbalanced expanders, and extractors, in Proceedings of the 33rd Symposium on Theory of Computing (STOC'01), ACM, New York, 2001, pp. 143-152. (Pubitemid 32865727)
-
(2001)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 143-152
-
-
Ta-Shma, A.1
Umans, C.2
Zuckerman, D.3
-
30
-
-
33646520833
-
Extractors from Reed-Muller codes
-
A. TA-SHMA, D. ZUCKERMAN, and S. SAFRA, Extractors from Reed-Muller codes, J. Comput. System Sci., 72(2006), pp. 786-812.
-
(2006)
J. Comput. System Sci.
, vol.72
, pp. 786-812
-
-
Ta-Shma, A.1
Zuckerman, D.2
Safra, S.3
-
31
-
-
77955759356
-
Duality between smooth min-and maxentropies
-
M. TOMAMICHEL, R. COLBECK, and R. RENNER, Duality between smooth min-and maxentropies, IEEE Trans. Inform. Theory, 56(2010), pp. 4674-4681.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, pp. 4674-4681
-
-
Tomamichel, M.1
Colbeck, R.2
Renner, R.3
-
32
-
-
77955669047
-
Leftover hashing against quantum side information
-
IEEE Press, Piscataway, NJ
-
M. TOMAMICHEL, C. SCHAFFNER, A. SMITH, and R. RENNER, Leftover hashing against quantum side information, in Proceedings of 2010 International Symposium on Information Theory (ISIT), IEEE Press, Piscataway, NJ, 2010, pp. 2703-2707.
-
(2010)
Proceedings of 2010 International Symposium on Information Theory (ISIT)
, pp. 2703-2707
-
-
Tomamichel, M.1
Schaffner, C.2
Smith, A.3
Renner, R.4
-
33
-
-
0005314594
-
Extractors and pseudorandom generators
-
L. TREVISAN, Extractors and pseudorandom generators, J. ACM, 48(2001), pp. 860-879.
-
(2001)
J. ACM
, vol.48
, pp. 860-879
-
-
Trevisan, L.1
-
34
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the boundedstorage model
-
S. P. VADHAN, Constructing locally computable extractors and cryptosystems in the boundedstorage model, J. Cryptol., 17(2004), pp. 43-77.
-
(2004)
J. Cryptol.
, vol.17
, pp. 43-77
-
-
Vadhan, S.P.1
-
35
-
-
0040707391
-
Expanders that beat the eigenvalue bound: Explicit construction and applications
-
A. WIGDERSON and D. ZUCKERMAN, Expanders that beat the eigenvalue bound: Explicit construction and applications, Combinatorica, 19(1999), pp. 125-138.
-
(1999)
Combinatorica
, vol.19
, pp. 125-138
-
-
Wigderson, A.1
Zuckerman, D.2
-
36
-
-
84866427894
-
-
preprint
-
F. XU, B. QI, X. MA, H. XU, H. ZHENG, and H.-K. LO, An ultrafast quantum random number generator based on quantum phase fluctuations, preprint available at http://arxiv.org/abs/1109.0643 (2011).
-
(2011)
An Ultrafast Quantum Random Number Generator Based on Quantum Phase Fluctuations
-
-
Xu, F.1
Qi, B.2
Ma, X.3
Xu, H.4
Zheng, H.5
Lo, H.-K.6
-
37
-
-
0020301290
-
Theory and applications of trapdoor functions (extended abstract)
-
IEEE Press, Piscataway, NJ
-
A. C.-C. YAO, Theory and applications of trapdoor functions (extended abstract), in Proceedings of the 23rd Symposium on Foundations of Computer Science (FOCS'82), IEEE Press, Piscataway, NJ, 1982, pp. 80-91.
-
(1982)
Proceedings of the 23rd Symposium on Foundations of Computer Science (FOCS'82)
, pp. 80-91
-
-
Yao, A.C.-C.1
|