Author of the publication

An optimal quantum algorithm to approximate the mean and its application for approximating the median of a set of points over an arbitrary distance

, , , and . CoRR, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is information the key?. Nature Phys., 1 (1): 2--4 (October 2005)Security Aspects of Practical Quantum Cryptography., , , and . EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, page 289-299. Springer, (2000)Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds., , and . ICALP, volume 372 of Lecture Notes in Computer Science, page 123-136. Springer, (1989)CLARISSE: A Machine Learning Tool to Initialize Student Models., , , and . Intelligent Tutoring Systems, volume 2363 of Lecture Notes in Computer Science, page 718-728. Springer, (2002)Two Observations on Probabilistic Primality Testing., , and . CRYPTO, volume 263 of Lecture Notes in Computer Science, page 443-450. Springer, (1986)All-or-Nothing Disclosure of Secrets., , and . CRYPTO, volume 263 of Lecture Notes in Computer Science, page 234-238. Springer, (1986)How to Reduce Your Enemy's Information (Extended Abstract)., , and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 468-476. Springer, (1985)Computationally Convincing Proofs of Knowledge., , , and . STACS, volume 480 of Lecture Notes in Computer Science, page 251-262. Springer, (1991)Key Establishment à la Merkle in a Quantum World., , , , , and . J. Cryptol., 32 (3): 601-634 (2019)Multi-party Pseudo-Telepathy., , and . WADS, volume 2748 of Lecture Notes in Computer Science, page 1-11. Springer, (2003)