An update on quantum cryptography
Proceedings of CRYPTO 84 on Advances in cryptology
ACM SIGACT News
Quantum public key distribution reinvented
ACM SIGACT News
Experimental quantum cryptography
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Security of quantum protocols against coherent measurements
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Comparing information without leaking it
Communications of the ACM
25 years of quantum cryptography
ACM SIGACT News
Oblivious transfer and polynomial evaluation
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
More general completeness theorems for secure two-party computation
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
A proof of the security of quantum key distribution (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Selective private function evaluation with applications to private statistics
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Generalized Zig-zag Functions and Oblivious Transfer Reductions
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
New Results on Unconditionally Secure Distributed Oblivious Transfer
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Oblivious Transfer with Adaptive Queries
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Quantum Bit Commitment and Coin Tossing Protocols
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Practical Quantum Oblivious Transfer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Quantum Cryptography over Underground Optical Fibers
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On Deniability in Quantum Key Exchange
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
The Search for the Holy Grail in Quantum Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Topical Review: Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution
Quantum Information Processing
IBM Journal of Research and Development
Picturing qubits in phase space
IBM Journal of Research and Development
Blind sales in electronic commerce
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
The Physics of No-Bit-Commitment: Generalized Quantum Non-Locality Versus Oblivious Transfer
Quantum Information Processing
An introduction to quantum cryptography
Crossroads
Quantization of games: towards quantum artificial intelligence
Theoretical Computer Science
Quantum programming languages: survey and bibliography
Mathematical Structures in Computer Science
Journal of Computer Security
Quantum cryptography: A survey
ACM Computing Surveys (CSUR)
Unconditionally secure cryptosystems based on quantum cryptography
Information Sciences: an International Journal
Oblivious-Transfer Amplification
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Simulatable Adaptive Oblivious Transfer
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Composable Security in the Bounded-Quantum-Storage Model
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Interactive Hashing: An Information Theoretic Tool (Invited Talk)
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Statistical Security Conditions for Two-Party Secure Function Evaluation
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Oblivious Transfer Based on the McEliece Assumptions
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Decision Support Systems
Coding-Based Oblivious Transfer
Mathematical Methods in Computer Science
Oblivious Transfer from Weak Noisy Channels
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Essentially Optimal Universally Composable Oblivious Transfer
Information Security and Cryptology --- ICISC 2008
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Reducing Complexity Assumptions for Oblivious Transfer
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Efficient cryptographic protocols based on noisy channels
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Oblivious transfers and privacy amplification
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
How many oblivious transfers are needed for secure multiparty computation?
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
A tight high-order entropic quantum uncertainty relation with applications
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
OT-combiners via secure computation
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Mobility assisted secret key generation using wireless link signatures
INFOCOM'10 Proceedings of the 29th conference on Information communications
A survey of quantum key distribution protocols
Proceedings of the 7th International Conference on Frontiers of Information Technology
Quantum private queries: security analysis
IEEE Transactions on Information Theory
On the efficiency of classical and quantum oblivious transfer reductions
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Crypto topics and applications II
Algorithms and theory of computation handbook
Unconditionally secure all-or-nothing disclosure of secrets based on POVM measurements
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Practical adaptive oblivious transfer from simple assumptions
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Photonic entanglement for fundamental tests and quantum communication
Quantum Information & Computation
Proof of unconditional security of six-state quatum key distribution scheme
Quantum Information & Computation
Robust cryptography in the noisy-quantum-storage model
Quantum Information & Computation
Constant-rate oblivious transfer from noisy channels
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
An arbitrated quantum message signature scheme
CIS'04 Proceedings of the First international conference on Computational and Information Science
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
Quantum ANDOS protocol with unconditional security
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
Simple and tight bounds for information reconciliation and privacy amplification
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Trojan horse attack strategy on quantum private communication
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Why classical certification is impossible in a quantum world
Quantum Information Processing
Universally composable quantum multi-party computation
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Oblivious transfer and linear functions
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Optimal reductions between oblivious transfers using interactive hashing
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Information-Theoretic conditions for two-party secure function evaluation
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
On the efficiency of bit commitment reductions
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Practical quantum bit commitment protocol
Quantum Information Processing
Quantum money from hidden subspaces
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Communications of the ACM
A formal definition and a new security mechanism of physical unclonable functions
MMB'12/DFT'12 Proceedings of the 16th international GI/ITG conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
Hierarchical quantum information splitting with eight-qubit cluster states
Quantum Information Processing
Cryptanalysis of a new circular quantum secret sharing protocol for remote agents
Quantum Information Processing
Oblivious transfer and quantum channels as communication resources
Natural Computing: an international journal
Building one-time memories from isolated qubits: (extended abstract)
Proceedings of the 5th conference on Innovations in theoretical computer science
Hi-index | 0.09 |