On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation
暂无分享,去创建一个
[1] Yotaro Kubo. A Proof of Lemma 1 , 2014 .
[2] Guy N. Rothblum,et al. How to Compute in the Presence of Leakage , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[3] Ran Canetti,et al. Universally Composable Security with Local Adversaries , 2012, SCN.
[4] Yael Tauman Kalai,et al. Multiparty computation secure against continual memory leakage , 2012, STOC '12.
[5] Stefan Dziembowski,et al. Leakage-Resilient Circuits without Computational Assumptions , 2012, TCC.
[6] Nir Bitansky,et al. Leakage-Tolerant Interactive Protocols , 2011, TCC.
[7] Stefan Dziembowski,et al. Leakage-Resilient Cryptography From the Inner-Product Extractor , 2011, IACR Cryptol. ePrint Arch..
[8] Matthias Christandl,et al. Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.
[9] G. Mitchison,et al. One-and-a-Half Quantum de Finetti Theorems , 2006, quant-ph/0602130.
[10] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[11] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, TCC.
[12] Silvio Micali,et al. Physically Observable Cryptography , 2003, IACR Cryptol. ePrint Arch..
[13] Michael A. Nielsen,et al. Majorization and the interconversion of bipartite states , 2001, Quantum Inf. Comput..
[14] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[15] A. Winter. Coding theorems of quantum information theory , 1999, quant-ph/9907077.
[16] H. Chau,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1998, Science.
[17] Joe Kilian,et al. A note on efficient zero-knowledge proofs and arguments (extended abstract) , 1992, STOC '92.
[18] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[19] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[20] O. F. Cook. The Method of Types , 1898 .
[21] A Proof of Lemma 1 Proof , 2022 .