Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CLiKC: A Privacy-Mindful Approach When Sharing Data., , and . CRiSIS, volume 10158 of Lecture Notes in Computer Science, page 3-10. Springer, (2016)Quantum Counting., , and . ICALP, volume 1443 of Lecture Notes in Computer Science, page 820-831. Springer, (1998)Quantum clustering algorithms., , and . ICML, volume 227 of ACM International Conference Proceeding Series, page 1-8. ACM, (2007)Oblivious Transfers and Privacy Amplification., and . EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, page 334-347. Springer, (1997)One-Way Group Actions., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 94-107. Springer, (1990)Exact Classical Simulation of the Quantum-Mechanical GHZ Distribution., , and . IEEE Trans. Inf. Theory, 62 (2): 876-890 (2016)Blind sales in electronic commerce., , and . ICEC, volume 60 of ACM International Conference Proceeding Series, page 148-157. ACM, (2004)The Quantum Challenge to Structural Complexity Theory., and . SCT, page 132-137. IEEE Computer Society, (1992)Quantum public key distribution reinvented., and . SIGACT News, 18 (4): 51-53 (1987)Simple and Rigorous Proof Method for Practical Security of Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements., , , , and . CoRR, (2022)