Author of the publication

A Tight High-Order Entropic Quantum Uncertainty Relation with Applications.

, , , , and . CRYPTO, volume 4622 of Lecture Notes in Computer Science, page 360-378. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification., , , and . TQC, volume 7582 of Lecture Notes in Computer Science, page 29-44. Springer, (2012)A New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment., , , , , , , , , and 2 other author(s). CoRR, (2018)On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase., , and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 503-523. Springer, (2001)Sampling in a Quantum Population, and Applications., and . CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 724-741. Springer, (2010)Quantum Authentication and Encryption with Key Recycling - Or: How to Re-use a One-Time Pad Even if P=NP - Safely & Feasibly., and . EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science, page 311-338. (2017)On the Quantum Complexity of the Continuous Hidden Subgroup Problem., , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 341-370. Springer, (2020)Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions., , , , and . EUROCRYPT (2), volume 9057 of Lecture Notes in Computer Science, page 313-336. Springer, (2015)Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM., , , and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 729-757. Springer, (2022)Cryptography In the Bounded Quantum-Storage Model., , , and . FOCS, page 449-458. IEEE Computer Society, (2005)Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications., , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)