Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Indifferentiability to Constructive Cryptography (and Back)., and . TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 3-24. (2016)Discovering physical concepts with neural networks., , , , and . CoRR, (2018)Efficient Quantum Polar Codes Requiring No Preshared Entanglement., , , and . IEEE Trans. Inf. Theory, 61 (11): 6395-6414 (2015)The impossibility of non-signaling privacy amplification., , and . Theor. Comput. Sci., (2013)One-Shot Classical Data Compression With Quantum Side Information and the Distillation of Common Randomness or Secret Keys., and . IEEE Trans. Inf. Theory, 58 (3): 1985-1991 (2012)Smooth Max-Information as One-Shot Generalization for Mutual Information., , and . IEEE Trans. Inf. Theory, 60 (3): 1573-1581 (2014)The operational meaning of min- and max-entropy., , and . IEEE Trans. Inf. Theory, 55 (9): 4337-4347 (2009)Privacy amplification secure against an adversary with selectable knowledge., , and . ISIT, page 231. IEEE, (2004)Leftover Hashing against quantum side information., , , and . ISIT, page 2703-2707. IEEE, (2010)Single-world interpretations of quantum theory cannot be self-consistent, and . (2016)cite arxiv:1604.07422Comment: 25 pages, 4 figures; comments are very welcome.