Author of the publication

Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications.

, , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient quantum channel coding scheme requiring no preshared entanglement., , , and . ISIT, page 354-358. IEEE, (2013)Entropy Accumulation With Improved Second-Order Term., and . IEEE Trans. Inf. Theory, 65 (11): 7596-7612 (2019)Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling., , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, page 326-343. Springer, (2013)Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 282-314. Springer, (2018)Formalized functional analysis with semilinear maps., , and . ITP, volume 237 of LIPIcs, page 10:1-10:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)A Decoupling Approach to Classical Data Transmission Over Quantum Channels., , and . IEEE Trans. Inf. Theory, 60 (3): 1562-1572 (2014)On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation., , and . IACR Cryptology ePrint Archive, (2014)The capacity of quantum channels with side information at the transmitter.. ISIT, page 948-952. IEEE, (2009)On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation., , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 87-104. Springer, (2015)Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement., , and . Quantum, (2024)