Louis Salvail - Publications

Affiliations: 
Faculte des arts et des sciences Université de Montréal, Montréal, Canada 
Area:
Computer Science

39 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Brassard G, Høyer P, Kalach K, Kaplan M, Laplante S, Salvail L. Key Establishment à la Merkle in a Quantum World Journal of Cryptology. 32: 601-634. DOI: 10.1007/S00145-019-09317-Z  0.609
2016 Dupuis F, Fehr S, Lamontagne P, Salvail L. Adaptive versus non-adaptive strategies in the quantum setting with applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 33-59. DOI: 10.1007/978-3-662-53015-3_2  0.573
2015 Salvail L, Schaffner C, Sotáková M. Quantifying the leakage of quantum protocols for classical two-party cryptography International Journal of Quantum Information. 13. DOI: 10.1142/S0219749914500415  0.593
2014 Alléaume R, Branciard C, Bouda J, Debuisschert T, Dianati M, Gisin N, Godfrey M, Grangier P, Länger T, Lütkenhaus N, Monyk C, Painchault P, Peev M, Poppe A, Pornin T, ... ... Salvail L, et al. Using quantum key distribution for cryptographic purposes: A survey Theoretical Computer Science. 560: 62-81. DOI: 10.1016/J.Tcs.2014.09.018  0.533
2014 Damgård I, Fehr S, Salvail L, Schaffner C. Secure identification and QKD in the bounded-quantum-storage model Theoretical Computer Science. 560: 12-26. DOI: 10.1016/J.Tcs.2014.09.014  0.619
2014 Damgård I, Pedersen TB, Salvail L. How to re-use a one-time pad safely and almost optimally even if P = NP Natural Computing. 13: 469-486. DOI: 10.1007/S11047-014-9454-5  0.602
2014 Damgård I, Funder J, Nielsen JB, Salvail L. Superposition attacks on cryptographic protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8317: 142-161. DOI: 10.1007/978-3-319-04268-8_9  0.609
2012 Dupuis F, Nielsen JB, Salvail L. Actively secure two-party evaluation of any quantum operation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7417: 794-811. DOI: 10.1007/978-3-642-32009-5_46  0.488
2011 Crépeau C, Salvail L, Simard JR, Tapp A. Two provers in isolation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7073: 407-430. DOI: 10.1007/978-3-642-25385-0_22  0.467
2011 Brassard G, Høyer P, Kalach K, Kaplan M, Laplante S, Salvail L. Merkle puzzles in a quantum world Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6841: 391-410. DOI: 10.1007/978-3-642-22792-9_22  0.586
2010 Salvail L, Peev M, Diamanti E, Alléaume R, Lütkenhaus N, Länger T. Security of trusted repeater quantum key distribution networks Journal of Computer Security. 18: 61-87. DOI: 10.3233/Jcs-2010-0373  0.482
2010 Dupuis F, Nielsen JB, Salvail L. Secure two-party quantum evaluation of unitaries against specious adversaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6223: 685-706. DOI: 10.1007/978-3-642-14623-7_37  0.507
2009 Brassard G, Salvail L, Tapp A. Oblivious transfer à la merkle Proceedings of the 3rd International Conference On Quantum, Nano and Micro Technologies, Icqnm 2009. 102-108. DOI: 10.1109/ICQNM.2009.28  0.537
2009 Peev M, Pacher C, Alléaume R, Barreiro C, Bouda J, Boxleitner W, Debuisschert T, Diamanti E, Dianati M, Dynes JF, Fasel S, Fossier S, Fürst M, Gautier JD, Gay O, ... ... Salvail L, et al. The SECOQC quantum key distribution network in Vienna New Journal of Physics. 11. DOI: 10.1088/1367-2630/11/7/075001  0.464
2009 Salvail L, Schaffner C, Sotáková M. On the power of two-party quantum cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5912: 70-87. DOI: 10.1007/978-3-642-10366-7_5  0.54
2009 Damgård I, Fehr S, Lunemann C, Salvail L, Schaffner C. Improving the security of quantum protocols via commit-and-open Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 408-427. DOI: 10.1007/978-3-642-03356-8_24  0.591
2008 Brassard G, Salvail L. Quantum merkle puzzles Proceedings - the 2nd International Conference On Quantum-, Nano- and Micro-Technologies, Icqnm 2008. 76-79. DOI: 10.1109/ICQNM.2008.16  0.55
2007 Damgård IB, Fehr S, Salvail L, Schaffner C. Cryptography in the bounded-quantum-storage model Siam Journal On Computing. 37: 1865-1890. DOI: 10.1137/060651343  0.416
2007 Peev M, Alléaume R, Länger T, Lütkenhaus N, Salvail L. A quantum key distribution network: Integrated design and prototypical implementation Conference On Lasers and Electro-Optics Europe - Technical Digest. DOI: 10.1109/CLEOE-IQEC.2007.4387009  0.375
2007 Peev M, Alléaume R, Länger T, Lütkenhaus N, Salvail L. A quantum key distribution network: Integrated design and prototypical implementation Optics Infobase Conference Papers 0.375
2007 Damgård IB, Fehr S, Renner R, Salvail L, Schaffner C. A tight high-order entropie quantum uncertainty relation with applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4622: 360-378.  0.585
2006 Damgård I, Pedersen TB, Salvail L. A quantum cipher with near optimal key-recycling Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 494-510. DOI: 10.7146/Brics.V12I17.21883  0.618
2006 Arrighi P, Salvail L. Blind quantum computation International Journal of Quantum Information. 4: 883-898. DOI: 10.1142/S0219749906002171  0.446
2006 Damgård IB, Fehr S, Salvail L, Schaffner C. Oblivious transfer and linear functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4117: 427-444.  0.338
2005 Damgård IB, Fehr S, Salvail L, Schaffner C. Cryptography in the bounded quantum-storage model 2005 Ieee Information Theory Workshop On Theory and Practice in Information-Theoretic Security. 2005: 24-27. DOI: 10.7146/Brics.V12I20.21886  0.467
2004 Damgård I, Fehr S, Salvail L. Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3152: 254-272. DOI: 10.7146/Brics.V11I9.21834  0.627
2004 Damgård I, Fehr S, Morozov K, Salvail L. Unfair noisy channels and oblivious transfer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2951: 355-373. DOI: 10.7146/Brics.V10I36.21804  0.415
2004 Crépeau C, Dumais P, Mayers D, Salvail L. Computational collapse of quantum state with application to oblivious transfer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2951: 374-393.  0.404
2004 Damgård I, Pedersen T, Salvail L. On the key-uncertainty of quantum ciphers and the computational security of one-way quantum transmission Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 91-108.  0.581
2003 Crépeau C, Dumais P, Mayers D, Salvail L. Computational Collapse of Quantum State with Application to Oblivious Transfer Brics Report Series. 10. DOI: 10.7146/Brics.V10I37.21805  0.624
2003 Crépeau C, Dumais P, Mayers D, Salvail L. On the Computational Collapse of Quantum Information Brics Report Series. 10. DOI: 10.7146/Brics.V10I3.21774  0.605
2001 Nielsen PM, Schori C, Sørensen JL, Salvail L, Damgård I, Polzik E. Experimental quantum key distribution with proven security against realistic attacks Journal of Modern Optics. 48: 1921-1942. DOI: 10.1080/09500340110069237  0.549
2001 Crépeau C, Légaré F, Salvail L. How to convert the flavor of a quantum bit commitment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2045: 60-77.  0.51
2000 Crépeau C, Légaré F, Salvail L. How to Convert a Flavor of Quantum Bit Commitment Brics Report Series. 7. DOI: 10.7146/Brics.V7I52.20219  0.537
2000 Dumais P, Mayers D, Salvail L. Perfectly concealing quantum bit commitment from any quantum one-way permutation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1807: 300-315.  0.567
1999 Damgård I, Kilian J, Salvail L. On the (Im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1592: 56-73. DOI: 10.7146/Brics.V5I37.19442  0.386
1999 Salvail L. The Search for the Holy Grail in Quantum Cryptography Lecture Notes in Computer Science. 183-216. DOI: 10.1007/3-540-48969-X_9  0.641
1998 Salvail L. Quantum bit commitment from a physical assumption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1462: 338-353. DOI: 10.1007/BFb0055740  0.445
1992 Bennett CH, Bessette F, Brassard G, Salvail L, Smolin J. Experimental quantum cryptography Journal of Cryptology. 5: 3-28. DOI: 10.1007/BF00191318  0.529
Show low-probability matches.