Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved stochastic trace estimation using mutually unbiased bases., , , and . CoRR, (2016)Private quantum computation: An introduction to blind quantum computing and related protocols.. CoRR, (2016)Anonymous Quantum Communication - (Extended Abstract)., , , , and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 181-182. Springer, (2007)Composable security of delegated quantum computation, , , and . CoRR, (2013)Quantum proof systems for iterated exponential time, and beyond., , , and . STOC, page 473-480. ACM, (2019)Hardness of Classically Simulating the One-Clean-Qubit Model, , and . Physical review letters, 112 (13): 130502 (2014)Freely Scalable Quantum Technologies using Cells of 5-to-50 Qubits with Very Lossy and Noisy Photonic Links, , and . arXiv preprint arXiv:1406.0880, (2014)To appear in Physical Review X.Architectures for quantum computation under restricted control.. University of Oxford, UK, (2007)British Library, EThOS.On the hardness of classically simulating the one clean qubit model., , and . CoRR, (2013)Limitations on information theoretically secure quantum homomorphic encryption, , and . arXiv preprint arXiv:1406.2456, (2014)