The following pages link to Theory of Cryptography (Q5711655):
Displaying 37 items.
- Attacks on quantum key distribution protocols that employ non-ITS authentication (Q265393) (← links)
- How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) (Q268461) (← links)
- Secure identification and QKD in the bounded-quantum-storage model (Q477165) (← links)
- A practical protocol for three-party authenticated quantum key distribution (Q488178) (← links)
- The quantum reverse Shannon theorem based on one-shot information theory (Q717117) (← links)
- HalftimeHash: modern hashing without 64-bit multipliers or finite fields (Q832844) (← links)
- Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line (Q892646) (← links)
- Quantum cryptography (Q975385) (← links)
- New bounds on classical and quantum one-way communication complexity (Q1029354) (← links)
- Everlasting multi-party computation (Q1994636) (← links)
- Security proof for round-robin differential phase shift QKD (Q1994673) (← links)
- Quantum key distribution using universal hash functions over finite fields (Q2107057) (← links)
- Quantum and semi-quantum sealed-bid auction: vulnerabilities and advantages (Q2107963) (← links)
- Toward secure communication using intra-particle entanglement (Q2347677) (← links)
- Entanglement of the antisymmetric state (Q2428487) (← links)
- One-shot decoupling (Q2452200) (← links)
- Measure-resend authenticated semi-quantum key distribution with single photons (Q2679046) (← links)
- Differential phase encoded measurement-device-independent quantum key distribution (Q2687107) (← links)
- Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications (Q2829942) (← links)
- The Locking-Decoding Frontier for Generic Dynamics (Q3453310) (← links)
- Composable Security in the Bounded-Quantum-Storage Model (Q3519536) (← links)
- Simple and Tight Device-Independent Security Proofs (Q4629390) (← links)
- Two-way unclonable encryption with a vulnerable sender (Q5074431) (← links)
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths (Q5137709) (← links)
- Decoupling with unitary approximate two-designs (Q5141486) (← links)
- Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths (Q5143230) (← links)
- Discrete-phase-randomized coherent state source and its application in quantum key distribution (Q5144007) (← links)
- Robustness and device independence of verifiable blind quantum computing (Q5151595) (← links)
- Chain rules for quantum Rényi entropies (Q5178174) (← links)
- Quantum Authentication with Key Recycling (Q5270367) (← links)
- Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought) (Q5271780) (← links)
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker (Q5445521) (← links)
- Uniform continuity bound for sandwiched Rényi conditional entropy (Q5883431) (← links)
- Preface (Q5965465) (← links)
- Preface (Q5965701) (← links)
- Bounds for smooth min- and max-entropy (Q6098282) (← links)
- A quantum key distribution on qudits using quantum operators (Q6183114) (← links)