Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithmics - theory and practice., and . Prentice Hall, (1988)Quantum Communication Complexity (A Survey). (2007)Provably Secure Key Establishment Against Quantum Adversaries., , , , , and . TQC, volume 73 of LIPIcs, page 3:1-3:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)One-Way Group Actions., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 94-107. Springer, (1990)A Quantum Jump in Computer Science.. Computer Science Today, volume 1000 of Lecture Notes in Computer Science, Springer, (1995)Quantum Counting., , and . ICALP, volume 1443 of Lecture Notes in Computer Science, page 820-831. Springer, (1998)CLiKC: A Privacy-Mindful Approach When Sharing Data., , and . CRiSIS, volume 10158 of Lecture Notes in Computer Science, page 3-10. Springer, (2016)Quantum clustering algorithms., , and . ICML, volume 227 of ACM International Conference Proceeding Series, page 1-8. ACM, (2007)Oblivious Transfers and Privacy Amplification., and . EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, page 334-347. Springer, (1997)Exact Classical Simulation of the Quantum-Mechanical GHZ Distribution., , and . IEEE Trans. Inf. Theory, 62 (2): 876-890 (2016)