Publication | Date of Publication | Type |
---|
Quantum cryptanalysis of hash and claw-free functions | 2023-04-12 | Paper |
Noisy Interactive Quantum Communication | 2019-09-02 | Paper |
Key establishment à la Merkle in a quantum world | 2019-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4637977 | 2018-05-03 | Paper |
New trends in quantum computing | 2017-11-16 | Paper |
Exact Classical Simulation of the Quantum-Mechanical GHZ Distribution | 2017-04-28 | Paper |
An Update on Quantum Cryptography | 2017-04-10 | Paper |
Exact simulation of the GHZ distribution | 2017-03-13 | Paper |
Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\) | 2016-04-15 | Paper |
Cryptography in a Quantum World | 2016-03-10 | Paper |
Simulating Equatorial Measurements on GHZ States with Finite Expected Communication Cost | 2015-12-03 | Paper |
Quantum cryptography: public key distribution and coin tossing | 2014-12-02 | Paper |
Strict hierarchy among Bell theorems | 2013-12-11 | Paper |
Classical, quantum and nonsignalling resources in bipartite games | 2013-12-11 | Paper |
Quantum speed-up for unsupervised learning | 2013-03-28 | Paper |
Limit on Nonlocality in Any World in Which Communication Complexity Is Not Trivial | 2011-12-26 | Paper |
Quantum communication complexity | 2011-10-17 | Paper |
Merkle Puzzles in a Quantum World | 2011-08-12 | Paper |
Can quantum-mechanical description of physical reality be considered correct? | 2010-05-21 | Paper |
Algorithms and Data Structures | 2010-04-20 | Paper |
Anonymous Quantum Communication | 2009-12-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3392685 | 2009-08-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q3522528 | 2008-09-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3522552 | 2008-09-03 | Paper |
Anonymous Quantum Communication | 2008-05-15 | Paper |
Experimental quantum cryptography. | 2007-08-14 | Paper |
Quantum pseudo-telepathy | 2006-09-28 | Paper |
CAN QUANTUM-MECHANICAL DESCRIPTION OF PHYSICAL REALITY BE CONSIDERED INCOMPLETE? | 2006-05-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374915 | 2006-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4819589 | 2004-09-27 | Paper |
Oblivious transfer and privacy amplification | 2004-09-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q3046157 | 2004-08-12 | Paper |
Quantum computing without entanglement | 2004-08-10 | Paper |
Security of quantum key distribution against all collective attacks | 2003-05-04 | Paper |
Multi-particle entanglement via two-party entanglement | 2002-01-27 | Paper |
Teleportation as a quantum computation. | 2000-11-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4939134 | 2000-10-22 | Paper |
Oracle Quantum Computing | 2000-07-16 | Paper |
Reduction of Quantum Entropy by Reversible Extraction of Classical Information | 2000-07-16 | Paper |
Quantum cryptography without Bell’s theorem | 2000-07-16 | Paper |
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels | 2000-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4934732 | 2000-02-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4240337 | 1999-10-20 | Paper |
Strengths and Weaknesses of Quantum Computing | 1998-02-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4369444 | 1998-01-28 | Paper |
Subquadratic zero-knowledge | 1998-01-28 | Paper |
Oblivious transfers and intersecting codes | 1997-04-27 | Paper |
Generalized privacy amplification | 1997-02-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4846806 | 1995-09-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279566 | 1994-09-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279563 | 1994-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4040055 | 1993-06-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4035674 | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4023840 | 1993-01-23 | Paper |
Modern cryptology. A tutorial | 1992-09-17 | Paper |
Constant-round perfect zero-knowledge computationally convincing protocols | 1991-01-01 | Paper |
Minimum disclosure proofs of knowledge | 1988-01-01 | Paper |
The generation of random permutations on the fly | 1988-01-01 | Paper |
A generalization of Hellman's extension of Shannon's approach to cryptography | 1988-01-01 | Paper |
The generation of random numbers that are probably prime | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3495188 | 1988-01-01 | Paper |
Privacy Amplification by Public Discussion | 1988-01-01 | Paper |
Zero-Knowledge Simulation of Boolean Circuits | 1987-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3786518 | 1987-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3793691 | 1987-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3716292 | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3686040 | 1985-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3674539 | 1983-01-01 | Paper |
Relativized cryptography | 1983-01-01 | Paper |
A time-luck tradeoff in relativized cryptography | 1981-01-01 | Paper |
A note on the complexity of cryptography (Corresp.) | 1979-01-01 | Paper |