Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum attacks against iterated block ciphers.. CoRR, (2014)Quantum Differential and Linear Cryptanalysis., , , and . CoRR, (2015)Quantum Differential and Linear Cryptanalysis., , , and . IACR Trans. Symmetric Cryptol., 2016 (1): 71-94 (2016)Breaking Symmetric Cryptosystems Using Quantum Period Finding., , , and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 207-237. Springer, (2016)Non-Local Box Complexity and Secure Function Evaluation., , , and . FSTTCS, volume 4 of LIPIcs, page 239-250. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2009)The communication complexity of non-signaling distributions., , , and . CoRR, (2008)Méthodes Combinatoires et Algébriques en Complexité de la Communication.. University of Paris-Sud, Orsay, France, (2009)On the Everlasting Security of Password-Authenticated Quantum Key Exchange., , and . CoRR, (2019)Kolmogorov Complexity and Combinatorial Methods in Communication Complexity., and . TAMC, volume 5532 of Lecture Notes in Computer Science, page 261-270. Springer, (2009)Simulating Equatorial Measurements on GHZ States with Finite Expected Communication Cost., and . TQC, volume 7582 of Lecture Notes in Computer Science, page 65-73. Springer, (2012)