Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved stochastic trace estimation using mutually unbiased bases., , , and . CoRR, (2016)Private quantum computation: An introduction to blind quantum computing and related protocols.. CoRR, (2016)Composable security of delegated quantum computation, , , and . CoRR, (2013)Anonymous Quantum Communication - (Extended Abstract)., , , , and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 181-182. Springer, (2007)Quantum proof systems for iterated exponential time, and beyond., , , and . STOC, page 473-480. ACM, (2019)Hardness of Classically Simulating the One-Clean-Qubit Model, , and . Physical review letters, 112 (13): 130502 (2014)Freely Scalable Quantum Technologies using Cells of 5-to-50 Qubits with Very Lossy and Noisy Photonic Links, , and . arXiv preprint arXiv:1406.0880, (2014)To appear in Physical Review X.Architectures for quantum computation under restricted control.. University of Oxford, UK, (2007)British Library, EThOS.Limitations on information theoretically secure quantum homomorphic encryption, , and . arXiv preprint arXiv:1406.2456, (2014)Experimental verification of quantum computation, , , and . Nature Physics, (2013)