Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels, , , , , and . Physical Review Letters, 70 (13): 1895--1899 (Mar 29, 1993)Anonymous Quantum Communication - (Extended Abstract)., , , , and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 181-182. Springer, (2007)Brief history of quantum cryptography: a personal perspective.. ICITS, page 19-23. IEEE, (2005)Quantum Merkle Puzzles., and . ICQNM, page 76-79. IEEE Computer Society, (2008)Quantum computing without entanglement., , , and . Theor. Comput. Sci., 320 (1): 15-33 (2004)Sorting out Zero-Knowledge., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 181-191. Springer, (1989)Experimental Quantum Cryptography., , , , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 253-265. Springer, (1990)Noisy Interactive Quantum Communication., , , , and . FOCS, page 296-305. IEEE Computer Society, (2014)A Quantum Bit Commitment Scheme Provably Unbreakable by both Parties, , , and . FOCS, page 362-371. IEEE Computer Society, (1993)Cryptology in Academia: A Ten Year Retrospective.. COMPCON, page 222-226. IEEE Computer Society, (1987)