Author of the publication

Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications.

, , , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 33-59. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Relativistic Zero-Knowledge for NP., , , , and . IACR Cryptol. ePrint Arch., (2019)Key Establishment à la Merkle in a Quantum World., , , , , and . J. Cryptol., 32 (3): 601-634 (2019)Powerful Primitives in the Bounded Quantum Storage Model., and . CoRR, (2023)A Tight High-Order Entropic Quantum Uncertainty Relation with Applications., , , , and . CRYPTO, volume 4622 of Lecture Notes in Computer Science, page 360-378. Springer, (2007)On the Power of Two-Party Quantum Cryptography., , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 70-87. Springer, (2009)Merkle Puzzles in a Quantum World., , , , , and . CRYPTO, volume 6841 of Lecture Notes in Computer Science, page 391-410. Springer, (2011)Quantum Oblivious Mutual Identification., and . EUROCRYPT, volume 921 of Lecture Notes in Computer Science, page 133-146. Springer, (1995)Quantum Authentication and Encryption with Key Recycling., and . IACR Cryptology ePrint Archive, (2017)Secret-Key Reconciliation by Public Discussion., and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 410-423. Springer, (1993)Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries., , and . CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 685-706. Springer, (2010)