Year |
Citation |
Score |
2019 |
Coopmans TJ, Kaniewski J, Schaffner C. Robust self-testing of two-qubit states Physical Review A. 99. DOI: 10.1103/Physreva.99.052123 |
0.323 |
|
2018 |
Furrer F, Gehring T, Schaffner C, Pacher C, Schnabel R, Wehner S. Continuous-variable protocol for oblivious transfer in the noisy-storage model. Nature Communications. 9: 1450. PMID 29654262 DOI: 10.1038/S41467-018-03729-4 |
0.561 |
|
2018 |
Dulek Y, Schaffner C, Speelman F. Quantum Homomorphic Encryption for Polynomial-Size Circuits Theory of Computing. 14: 1-45. DOI: 10.4086/Toc.2018.V014A007 |
0.554 |
|
2016 |
Broadbent A, Schaffner C. Quantum cryptography beyond quantum key distribution. Designs, Codes, and Cryptography. 78: 351-382. PMID 32226229 DOI: 10.1007/S10623-015-0157-4 |
0.57 |
|
2015 |
Salvail L, Schaffner C, Sotáková M. Quantifying the leakage of quantum protocols for classical two-party cryptography International Journal of Quantum Information. 13. DOI: 10.1142/S0219749914500415 |
0.588 |
|
2015 |
Piovesan T, Scarpa G, Schaffner C. Multiparty Zero-Error Classical Channel Coding With Entanglement Ieee Transactions On Information Theory. 61: 1113-1123. DOI: 10.1109/Tit.2014.2379273 |
0.367 |
|
2014 |
Buhrma H, Chandran N, Fehr S, Gelles R, Goyal V, Ostrovsky R, Schaffner C. Position-based quantum cryptography:Impossibility and constructions Siam Journal On Computing. 43: 150-178. DOI: 10.1137/130913687 |
0.559 |
|
2014 |
Damgård I, Fehr S, Salvail L, Schaffner C. Secure identification and QKD in the bounded-quantum-storage model Theoretical Computer Science. 560: 12-26. DOI: 10.1016/J.Tcs.2014.09.014 |
0.576 |
|
2012 |
Buhrman H, Christandl M, Schaffner C. Complete insecurity of quantum protocols for classical two-party computation. Physical Review Letters. 109: 160501. PMID 23215060 DOI: 10.1103/Physrevlett.109.160501 |
0.561 |
|
2012 |
Bouman NJ, Fehr S, González-Guillén C, Schaffner C. An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification Lecture Notes in Computer Science. 7582: 29-44. DOI: 10.1007/978-3-642-35656-8_3 |
0.331 |
|
2011 |
Tomamichel M, Schaffner C, Smith A, Renner R. Leftover Hashing Against Quantum Side Information Ieee Transactions On Information Theory. 57: 5524-5535. DOI: 10.1109/Tit.2011.2158473 |
0.472 |
|
2010 |
Schaffner C. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model Physical Review A. 82: 32308. DOI: 10.1103/Physreva.82.032308 |
0.542 |
|
2010 |
Wehner S, Curty M, Schaffner C, Lo HK. Implementation of two-party protocols in the noisy-storage model Physical Review a - Atomic, Molecular, and Optical Physics. 81. DOI: 10.1103/Physreva.81.052336 |
0.543 |
|
2009 |
Konig R, Renner R, Schaffner C. The Operational Meaning of Min- and Max-Entropy Ieee Transactions On Information Theory. 55: 4337-4347. DOI: 10.1109/Tit.2009.2025545 |
0.328 |
|
2008 |
Wehner S, Schaffner C, Terhal BM. Cryptography from noisy storage. Physical Review Letters. 100: 220502. PMID 18643410 DOI: 10.1103/Physrevlett.100.220502 |
0.552 |
|
2005 |
Damgård IB, Fehr S, Salvail L, Schaffner C. Cryptography in the bounded quantum-storage model 2005 Ieee Information Theory Workshop On Theory and Practice in Information-Theoretic Security. 2005: 24-27. DOI: 10.7146/Brics.V12I20.21886 |
0.452 |
|
Show low-probability matches. |