Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum key distribution and cryptography: a survey., , , , , , , , , and 14 other author(s). Classical and Quantum Information Assurance Foundations and Practice, volume 09311 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)pecial CAI Section Devoted to MEMICS '11: Preface., , , , and . Comput. Informatics, 31 (3): 481- (2012)Encryption Of Quantum Information., and . Int. J. Found. Comput. Sci., 14 (5): 741-756 (2003)Towards True Random Number Generation in Mobile Environments., , , and . NordSec, volume 5838 of Lecture Notes in Computer Science, page 179-189. Springer, (2009)Using quantum key distribution for cryptographic purposes: A survey., , , , , , , , , and 13 other author(s). Theor. Comput. Sci., (2014)Improving the Hadamard extractor., , and . Theor. Comput. Sci., (2012)Encryption with weakly random keys using a quantum ciphertext., , and . Quantum Inf. Comput., 12 (5-6): 395-403 (2012)Device-independent Randomness Extraction for Arbitrarily Weak Min-entropy Source., , , and . TQC, volume 27 of LIPIcs, page 205-211. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2014)SECOQC White Paper on Quantum Key Distribution and Cryptography, , , , , , , , , and 13 other author(s). CoRR, (2007)Anonymous Transmission of Quantum Information., and . ICQNM, page 12. IEEE Computer Society, (2007)