On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation

[1]  Yotaro Kubo A Proof of Lemma 1 , 2014 .

[2]  Guy N. Rothblum,et al.  How to Compute in the Presence of Leakage , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.

[3]  Ran Canetti,et al.  Universally Composable Security with Local Adversaries , 2012, SCN.

[4]  Yael Tauman Kalai,et al.  Multiparty computation secure against continual memory leakage , 2012, STOC '12.

[5]  Stefan Dziembowski,et al.  Leakage-Resilient Circuits without Computational Assumptions , 2012, TCC.

[6]  Nir Bitansky,et al.  Leakage-Tolerant Interactive Protocols , 2011, TCC.

[7]  Stefan Dziembowski,et al.  Leakage-Resilient Cryptography From the Inner-Product Extractor , 2011, IACR Cryptol. ePrint Arch..

[8]  Matthias Christandl,et al.  Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.

[9]  G. Mitchison,et al.  One-and-a-Half Quantum de Finetti Theorems , 2006, quant-ph/0602130.

[10]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[11]  Silvio Micali,et al.  Physically Observable Cryptography (Extended Abstract) , 2004, TCC.

[12]  Silvio Micali,et al.  Physically Observable Cryptography , 2003, IACR Cryptol. ePrint Arch..

[13]  Michael A. Nielsen,et al.  Majorization and the interconversion of bipartite states , 2001, Quantum Inf. Comput..

[14]  Ran Canetti,et al.  Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.

[15]  A. Winter Coding theorems of quantum information theory , 1999, quant-ph/9907077.

[16]  H. Chau,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1998, Science.

[17]  Joe Kilian,et al.  A note on efficient zero-knowledge proofs and arguments (extended abstract) , 1992, STOC '92.

[18]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[19]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[20]  O. F. Cook The Method of Types , 1898 .

[21]  A Proof of Lemma 1 Proof , 2022 .