| Publication | Date of Publication | Type |
|---|
On computable numbers, with an application to the Druckproblem Theoretical Computer Science | 2024-06-03 | Paper |
Quantum cryptanalysis of hash and claw-free functions LATIN'98: Theoretical Informatics | 2023-04-12 | Paper |
Noisy interactive quantum communication SIAM Journal on Computing | 2019-09-02 | Paper |
Key establishment à la Merkle in a quantum world Journal of Cryptology | 2019-08-13 | Paper |
Provably secure key establishment against quantum adversaries (available as arXiv preprint) | 2018-05-03 | Paper |
New trends in quantum computing STACS 96 | 2017-11-16 | Paper |
Exact Classical Simulation of the Quantum-Mechanical GHZ Distribution IEEE Transactions on Information Theory | 2017-04-28 | Paper |
An Update on Quantum Cryptography Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 2017-04-10 | Paper |
Exact classical simulation of the GHZ distribution (available as arXiv preprint) | 2017-03-13 | Paper |
Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\) Natural Computing | 2016-04-15 | Paper |
Cryptography in a quantum world Lecture Notes in Computer Science | 2016-03-10 | Paper |
Simulating Equatorial Measurements on GHZ States with Finite Expected Communication Cost Theory of Quantum Computation, Communication, and Cryptography | 2015-12-03 | Paper |
Quantum cryptography: public key distribution and coin tossing Theoretical Computer Science | 2014-12-02 | Paper |
Classical, quantum and nonsignalling resources in bipartite games Theoretical Computer Science | 2013-12-11 | Paper |
Strict hierarchy among Bell theorems Theoretical Computer Science | 2013-12-11 | Paper |
Quantum speed-up for unsupervised learning Machine Learning | 2013-03-28 | Paper |
Limit on nonlocality in any world in which communication complexity is not trivial Physical Review Letters | 2011-12-26 | Paper |
Quantum communication complexity Foundations of Physics | 2011-10-17 | Paper |
Merkle puzzles in a quantum world Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Can quantum-mechanical description of physical reality be considered correct? Foundations of Physics | 2010-05-21 | Paper |
Algorithms and Data Structures Lecture Notes in Computer Science | 2010-04-20 | Paper |
Anonymous quantum communication (extended abstract) Lecture Notes in Computer Science | 2009-12-03 | Paper |
| scientific article; zbMATH DE number 5595866 (Why is no real title available?) | 2009-08-17 | Paper |
Minimum entangled state dimension required for pseudo-telepathy (available as arXiv preprint) | 2008-09-03 | Paper |
scientific article; zbMATH DE number 5320338 (Why is no real title available?) (available as arXiv preprint) | 2008-09-03 | Paper |
Anonymous Quantum Communication Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Experimental quantum cryptography. Journal of Cryptology | 2007-08-14 | Paper |
Quantum pseudo-telepathy Foundations of Physics | 2006-09-28 | Paper |
CAN QUANTUM-MECHANICAL DESCRIPTION OF PHYSICAL REALITY BE CONSIDERED INCOMPLETE? International Journal of Quantum Information | 2006-05-10 | Paper |
Security aspects of practical quantum cryptography (available as arXiv preprint) | 2006-03-01 | Paper |
scientific article; zbMATH DE number 2103524 (Why is no real title available?) (available as arXiv preprint) | 2004-09-27 | Paper |
Oblivious transfer and privacy amplification Journal of Cryptology | 2004-09-22 | Paper |
| scientific article; zbMATH DE number 2089045 (Why is no real title available?) | 2004-08-12 | Paper |
Quantum computing without entanglement Theoretical Computer Science | 2004-08-10 | Paper |
Security of quantum key distribution against all collective attacks Algorithmica | 2003-05-04 | Paper |
Multi-particle entanglement via two-party entanglement Journal of Physics A: Mathematical and General | 2002-01-27 | Paper |
Teleportation as a quantum computation. Physica D | 2000-11-20 | Paper |
| scientific article; zbMATH DE number 1406110 (Why is no real title available?) | 2000-10-22 | Paper |
Quantum cryptography without Bell’s theorem Physical Review Letters | 2000-07-16 | Paper |
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels Physical Review Letters | 2000-07-16 | Paper |
Oracle Quantum Computing Journal of Modern Optics | 2000-07-16 | Paper |
Reduction of Quantum Entropy by Reversible Extraction of Classical Information Journal of Modern Optics | 2000-07-16 | Paper |
| scientific article; zbMATH DE number 1394316 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1283995 (Why is no real title available?) | 1999-10-20 | Paper |
Strengths and Weaknesses of Quantum Computing SIAM Journal on Computing | 1998-02-10 | Paper |
Subquadratic zero-knowledge Journal of the ACM | 1998-01-28 | Paper |
| scientific article; zbMATH DE number 1099383 (Why is no real title available?) | 1998-01-28 | Paper |
Oblivious transfers and intersecting codes IEEE Transactions on Information Theory | 1997-04-27 | Paper |
Generalized privacy amplification IEEE Transactions on Information Theory | 1997-02-25 | Paper |
| scientific article; zbMATH DE number 793950 (Why is no real title available?) | 1995-09-10 | Paper |
| scientific article; zbMATH DE number 503244 (Why is no real title available?) | 1994-09-20 | Paper |
| scientific article; zbMATH DE number 503241 (Why is no real title available?) | 1994-03-07 | Paper |
| scientific article; zbMATH DE number 193197 (Why is no real title available?) | 1993-06-05 | Paper |
| scientific article; zbMATH DE number 176509 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 108379 (Why is no real title available?) | 1993-01-23 | Paper |
Modern cryptology. A tutorial Lecture Notes in Computer Science | 1992-09-17 | Paper |
Constant-round perfect zero-knowledge computationally convincing protocols Theoretical Computer Science | 1991-01-01 | Paper |
Minimum disclosure proofs of knowledge Journal of Computer and System Sciences | 1988-01-01 | Paper |
Privacy Amplification by Public Discussion SIAM Journal on Computing | 1988-01-01 | Paper |
The generation of random permutations on the fly Information Processing Letters | 1988-01-01 | Paper |
A generalization of Hellman's extension of Shannon's approach to cryptography Journal of Cryptology | 1988-01-01 | Paper |
The generation of random numbers that are probably prime Journal of Cryptology | 1988-01-01 | Paper |
| scientific article; zbMATH DE number 4168502 (Why is no real title available?) | 1988-01-01 | Paper |
Zero-Knowledge Simulation of Boolean Circuits Advances in Cryptology — CRYPTO’ 86 | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 4049704 (Why is no real title available?) | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 4058818 (Why is no real title available?) | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 3945341 (Why is no real title available?) | 1986-01-01 | Paper |
| scientific article; zbMATH DE number 3909741 (Why is no real title available?) | 1985-01-01 | Paper |
Relativized cryptography IEEE Transactions on Information Theory | 1983-01-01 | Paper |
| scientific article; zbMATH DE number 3827742 (Why is no real title available?) | 1983-01-01 | Paper |
A time-luck tradeoff in relativized cryptography Journal of Computer and System Sciences | 1981-01-01 | Paper |
A note on the complexity of cryptography (Corresp.) IEEE Transactions on Information Theory | 1979-01-01 | Paper |