Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy Accumulation With Improved Second-Order Term., and . IEEE Trans. Inf. Theory, 65 (11): 7596-7612 (2019)Efficient quantum channel coding scheme requiring no preshared entanglement., , , and . ISIT, page 354-358. IEEE, (2013)The capacity of quantum channels with side information at the transmitter.. ISIT, page 948-952. IEEE, (2009)Chain Rules for Smooth Min- and Max-Entropies., , , and . IEEE Trans. Inf. Theory, 59 (5): 2603-2612 (2013)On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation., , and . IACR Cryptology ePrint Archive, (2014)On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation., , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 87-104. Springer, (2015)Swiveled Rényi entropies., and . Quantum Inf. Process., 15 (3): 1309-1345 (2016)An optimal quantum algorithm to approximate the mean and its application for approximating the median of a set of points over an arbitrary distance, , , and . CoRR, (2011)Swiveled Rényi entropies., and . CoRR, (2015)Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries., , and . CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 685-706. Springer, (2010)