The following pages link to Serge Fehr (Q477163):
Displayed 50 items.
- Secure identification and QKD in the bounded-quantum-storage model (Q477165) (← links)
- Quantum cryptography (Q975385) (← links)
- Secure certification of mixed quantum states with application to two-party randomness generation (Q1631332) (← links)
- Classical proofs for the quantum collapsing property of classical hash functions (Q1631333) (← links)
- Sublinear bounds on the distinguishing advantage for multiple samples (Q1995509) (← links)
- On the compressed-oracle technique, and post-quantum security of proofs of sequential work (Q2056756) (← links)
- The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more (Q2104233) (← links)
- On the quantum complexity of the continuous hidden subgroup problem (Q2119017) (← links)
- Robust secret sharing with almost optimal share size and security against rushing adversaries (Q2119091) (← links)
- Compressing proofs of \(k\)-out-of-\(n\) partial knowledge (Q2139628) (← links)
- Online-extractability in the quantum random-oracle model (Q2170106) (← links)
- Towards optimal robust secret sharing with security against a rushing adversary (Q2292703) (← links)
- Security of the Fiat-Shamir transformation in the quantum random-oracle model (Q2304988) (← links)
- Algebraic manipulation detection codes (Q2438532) (← links)
- Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications (Q2829942) (← links)
- Unconditionally-Secure Robust Secret Sharing with Compact Shares (Q2894408) (← links)
- Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority (Q2914294) (← links)
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions (Q2948388) (← links)
- Cheater Detection in SPDZ Multiparty Computation (Q2953814) (← links)
- (Q2969044) (← links)
- On the Conditional Rényi Entropy (Q2983322) (← links)
- The garden-hose model (Q2986866) (← links)
- Secure Authentication from a Weak Key, without Leaking Information (Q3003386) (← links)
- Improving the Security of Quantum Protocols via Commit-and-Open (Q3183577) (← links)
- An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification (Q3455195) (← links)
- Multi-prover Commitments Against Non-signaling Attacks (Q3457076) (← links)
- Cryptography in the Bounded-Quantum-Storage Model (Q3549326) (← links)
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks (Q3563846) (← links)
- Sampling in a Quantum Population, and Applications (Q3582786) (← links)
- Perfect NIZK with Adaptive Soundness (Q3596375) (← links)
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles (Q3600228) (← links)
- Composing Quantum Protocols in a Classical Environment (Q3611776) (← links)
- Secure Identification and QKD in the Bounded-Quantum-Storage Model (Q3612558) (← links)
- A Tight High-Order Entropic Quantum Uncertainty Relation with Applications (Q3612559) (← links)
- (Q4409124) (← links)
- (Q4409143) (← links)
- Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments (Q4412799) (← links)
- (Q4434901) (← links)
- (Q4783743) (← links)
- Feasibility and Completeness of Cryptographic Tasks in the Quantum World (Q4910283) (← links)
- One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games (Q4924435) (← links)
- A monogamy-of-entanglement game with applications to device-independent quantum cryptography (Q5141579) (← links)
- Position-Based Quantum Cryptography: Impossibility and Constructions (Q5199205) (← links)
- Quantum Authentication and Encryption with Key Recycling (Q5270366) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311537) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311542) (← links)
- On quantum Rényi entropies: A new generalization and some properties (Q5412809) (← links)
- Position-Based Quantum Cryptography: Impossibility and Constructions (Q5419034) (← links)
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker (Q5445521) (← links)
- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields (Q5451035) (← links)