| Publication | Date of Publication | Type |
|---|
| On computable numbers, with an application to the Druckproblem | 2024-06-03 | Paper |
| Quantum cryptanalysis of hash and claw-free functions | 2023-04-12 | Paper |
| Noisy Interactive Quantum Communication | 2019-09-02 | Paper |
| Key establishment à la Merkle in a quantum world | 2019-08-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4637977 | 2018-05-03 | Paper |
| New trends in quantum computing | 2017-11-16 | Paper |
| Exact Classical Simulation of the Quantum-Mechanical GHZ Distribution | 2017-04-28 | Paper |
| An Update on Quantum Cryptography | 2017-04-10 | Paper |
| Exact simulation of the GHZ distribution | 2017-03-13 | Paper |
| Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\) | 2016-04-15 | Paper |
| Cryptography in a Quantum World | 2016-03-10 | Paper |
| Simulating Equatorial Measurements on GHZ States with Finite Expected Communication Cost | 2015-12-03 | Paper |
| Quantum cryptography: public key distribution and coin tossing | 2014-12-02 | Paper |
| Classical, quantum and nonsignalling resources in bipartite games | 2013-12-11 | Paper |
| Strict hierarchy among Bell theorems | 2013-12-11 | Paper |
| Quantum speed-up for unsupervised learning | 2013-03-28 | Paper |
| Limit on Nonlocality in Any World in Which Communication Complexity Is Not Trivial | 2011-12-26 | Paper |
| Quantum communication complexity | 2011-10-17 | Paper |
| Merkle Puzzles in a Quantum World | 2011-08-12 | Paper |
| Can quantum-mechanical description of physical reality be considered correct? | 2010-05-21 | Paper |
| Algorithms and Data Structures | 2010-04-20 | Paper |
| Anonymous Quantum Communication | 2009-12-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3392685 | 2009-08-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3522528 | 2008-09-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3522552 | 2008-09-03 | Paper |
| Anonymous Quantum Communication | 2008-05-15 | Paper |
| Experimental quantum cryptography. | 2007-08-14 | Paper |
| Quantum pseudo-telepathy | 2006-09-28 | Paper |
| CAN QUANTUM-MECHANICAL DESCRIPTION OF PHYSICAL REALITY BE CONSIDERED INCOMPLETE? | 2006-05-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3374915 | 2006-03-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4819589 | 2004-09-27 | Paper |
| Oblivious transfer and privacy amplification | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046157 | 2004-08-12 | Paper |
| Quantum computing without entanglement | 2004-08-10 | Paper |
| Security of quantum key distribution against all collective attacks | 2003-05-04 | Paper |
| Multi-particle entanglement via two-party entanglement | 2002-01-27 | Paper |
| Teleportation as a quantum computation. | 2000-11-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4939134 | 2000-10-22 | Paper |
| Quantum cryptography without Bell’s theorem | 2000-07-16 | Paper |
| Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels | 2000-07-16 | Paper |
| Oracle Quantum Computing | 2000-07-16 | Paper |
| Reduction of Quantum Entropy by Reversible Extraction of Classical Information | 2000-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4934732 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4240337 | 1999-10-20 | Paper |
| Strengths and Weaknesses of Quantum Computing | 1998-02-10 | Paper |
| Subquadratic zero-knowledge | 1998-01-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4369444 | 1998-01-28 | Paper |
| Oblivious transfers and intersecting codes | 1997-04-27 | Paper |
| Generalized privacy amplification | 1997-02-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4846806 | 1995-09-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279566 | 1994-09-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279563 | 1994-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4040055 | 1993-06-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4035674 | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4023840 | 1993-01-23 | Paper |
| Modern cryptology. A tutorial | 1992-09-17 | Paper |
| Constant-round perfect zero-knowledge computationally convincing protocols | 1991-01-01 | Paper |
| Minimum disclosure proofs of knowledge | 1988-01-01 | Paper |
| Privacy Amplification by Public Discussion | 1988-01-01 | Paper |
| The generation of random permutations on the fly | 1988-01-01 | Paper |
| A generalization of Hellman's extension of Shannon's approach to cryptography | 1988-01-01 | Paper |
| The generation of random numbers that are probably prime | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3495188 | 1988-01-01 | Paper |
| Zero-Knowledge Simulation of Boolean Circuits | 1987-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3786518 | 1987-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3793691 | 1987-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3716292 | 1986-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3686040 | 1985-01-01 | Paper |
| Relativized cryptography | 1983-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3674539 | 1983-01-01 | Paper |
| A time-luck tradeoff in relativized cryptography | 1981-01-01 | Paper |
| A note on the complexity of cryptography (Corresp.) | 1979-01-01 | Paper |