Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum key distribution and cryptography: a survey., , , , , , , , , and 14 other author(s). Classical and Quantum Information Assurance Foundations and Practice, volume 09311 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)Encryption Of Quantum Information., and . Int. J. Found. Comput. Sci., 14 (5): 741-756 (2003)pecial CAI Section Devoted to MEMICS '11: Preface., , , , and . Comput. Informatics, 31 (3): 481- (2012)Using quantum key distribution for cryptographic purposes: A survey., , , , , , , , , and 13 other author(s). Theor. Comput. Sci., (2014)Towards True Random Number Generation in Mobile Environments., , , and . NordSec, volume 5838 of Lecture Notes in Computer Science, page 179-189. Springer, (2009)Encryption with weakly random keys using a quantum ciphertext., , and . Quantum Information & Computation, 12 (5-6): 395-403 (2012)Anonymous Transmission of Quantum Information., and . ICQNM, page 12. IEEE Computer Society, (2007)SECOQC White Paper on Quantum Key Distribution and Cryptography, , , , , , , , , and 13 other author(s). CoRR, (2007)Improving the Hadamard extractor., , and . Theor. Comput. Sci., (2012)Device-independent Randomness Extraction for Arbitrarily Weak Min-entropy Source., , , and . TQC, volume 27 of LIPIcs, page 205-211. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2014)