Documentation
The Good, the bad, and the ugly of Thin Client/Server Computing
Quantum Money from Hidden Subspaces Scott Aaronson (MIT) Joint work with Paul Christiano A A.
New Developments in Quantum Money and Copy-Protected Software Scott Aaronson (MIT) Joint work with Paul Christiano A A.
Entanglement swapping and quantum teleportation Talk at: Institute of Applied Physics Johannes Kepler University Linz 10 Dec. 2012 Johannes Kofler Max.
Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks
The Learning With Errors Problem Oded Regev Tel Aviv University (for more details, see the survey paper in the proceedings) Cambridge, 2010/6/11.
PRATYAY MUKHERJEE AARHUS UNIVERSITY AARHUS UNIVERSITY PRATYAY MUKHERJEE 28. MARCH 2014 NEW RESULTS IN NON-MALLEABLE CODES PRATYAY MUKHERJEE 28. MARCH 2014.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw 30.1.2015.
New Developments in Quantum Money and Copy-Protected Software
Reasoning about Concrete Security in Protocol Proofs
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.