Author of the publication

Sharp lower bounds on the extractable randomness from non-uniform sources.

, , , and . IACR Cryptology ePrint Archive, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A simpler security proof for 6-state quantum key distribution., and . Quantum Inf. Comput., 23 (11&12): 949-960 (September 2023)Quantum digital signatures with smaller public keys.. Quantum Inf. Comput., 21 (11&12): 955-973 (2021)The Spammed Code Offset Method., and . IEEE Trans. Inf. Forensics Secur., 9 (5): 875-884 (2014)Dynamic Tardos Traitor Tracing Schemes., , , , and . IEEE Trans. Inf. Theory, 59 (7): 4230-4242 (2013)Flow-Based Reputation: More than Just Ranking., , and . Int. J. Inf. Technol. Decis. Mak., 11 (3): 551-578 (2012)Authenticated communication from quantum readout of PUFs., , and . Quantum Inf. Process., 16 (8): 200 (2017)Security proof for round-robin differential phase shift QKD., and . Quantum Inf. Process., 17 (10): 250 (2018)Verifiable Rotation of Homomorphic Encryptions., , , and . Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, page 393-410. Springer, (2009)Improving Frequency Estimation under Local Differential Privacy., , , and . WPES@CCS, page 123-135. ACM, (2020)False Negative probabilities in Tardos codes., and . IACR Cryptology ePrint Archive, (2012)