Author of the publication

Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications.

, , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient quantum channel coding scheme requiring no preshared entanglement., , , and . ISIT, page 354-358. IEEE, (2013)Actively Secure Two-Party Evaluation of Any Quantum Operation., , and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 794-811. Springer, (2012)Achieving the capacity of any DMC using only polar codes., , , and . ITW, page 114-118. IEEE, (2012)Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications., , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation., , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 87-104. Springer, (2015)The capacity of quantum channels with side information at the transmitter.. ISIT, page 948-952. IEEE, (2009)On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation., , and . IACR Cryptology ePrint Archive, (2014)Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling., , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, page 326-343. Springer, (2013)Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 282-314. Springer, (2018)Formalized functional analysis with semilinear maps., , and . ITP, volume 237 of LIPIcs, page 10:1-10:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)