Year |
Citation |
Score |
2019 |
Brassard G, Høyer P, Kalach K, Kaplan M, Laplante S, Salvail L. Key Establishment à la Merkle in a Quantum World Journal of Cryptology. 32: 601-634. DOI: 10.1007/S00145-019-09317-Z |
0.609 |
|
2016 |
Dupuis F, Fehr S, Lamontagne P, Salvail L. Adaptive versus non-adaptive strategies in the quantum setting with applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 33-59. DOI: 10.1007/978-3-662-53015-3_2 |
0.573 |
|
2015 |
Salvail L, Schaffner C, Sotáková M. Quantifying the leakage of quantum protocols for classical two-party cryptography International Journal of Quantum Information. 13. DOI: 10.1142/S0219749914500415 |
0.593 |
|
2014 |
Alléaume R, Branciard C, Bouda J, Debuisschert T, Dianati M, Gisin N, Godfrey M, Grangier P, Länger T, Lütkenhaus N, Monyk C, Painchault P, Peev M, Poppe A, Pornin T, ... ... Salvail L, et al. Using quantum key distribution for cryptographic purposes: A survey Theoretical Computer Science. 560: 62-81. DOI: 10.1016/J.Tcs.2014.09.018 |
0.533 |
|
2014 |
Damgård I, Fehr S, Salvail L, Schaffner C. Secure identification and QKD in the bounded-quantum-storage model Theoretical Computer Science. 560: 12-26. DOI: 10.1016/J.Tcs.2014.09.014 |
0.619 |
|
2014 |
Damgård I, Pedersen TB, Salvail L. How to re-use a one-time pad safely and almost optimally even if P = NP Natural Computing. 13: 469-486. DOI: 10.1007/S11047-014-9454-5 |
0.602 |
|
2014 |
Damgård I, Funder J, Nielsen JB, Salvail L. Superposition attacks on cryptographic protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8317: 142-161. DOI: 10.1007/978-3-319-04268-8_9 |
0.609 |
|
2012 |
Dupuis F, Nielsen JB, Salvail L. Actively secure two-party evaluation of any quantum operation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7417: 794-811. DOI: 10.1007/978-3-642-32009-5_46 |
0.488 |
|
2011 |
Crépeau C, Salvail L, Simard JR, Tapp A. Two provers in isolation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7073: 407-430. DOI: 10.1007/978-3-642-25385-0_22 |
0.467 |
|
2011 |
Brassard G, Høyer P, Kalach K, Kaplan M, Laplante S, Salvail L. Merkle puzzles in a quantum world Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6841: 391-410. DOI: 10.1007/978-3-642-22792-9_22 |
0.586 |
|
2010 |
Salvail L, Peev M, Diamanti E, Alléaume R, Lütkenhaus N, Länger T. Security of trusted repeater quantum key distribution networks Journal of Computer Security. 18: 61-87. DOI: 10.3233/Jcs-2010-0373 |
0.482 |
|
2010 |
Dupuis F, Nielsen JB, Salvail L. Secure two-party quantum evaluation of unitaries against specious adversaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6223: 685-706. DOI: 10.1007/978-3-642-14623-7_37 |
0.507 |
|
2009 |
Brassard G, Salvail L, Tapp A. Oblivious transfer à la merkle Proceedings of the 3rd International Conference On Quantum, Nano and Micro Technologies, Icqnm 2009. 102-108. DOI: 10.1109/ICQNM.2009.28 |
0.537 |
|
2009 |
Peev M, Pacher C, Alléaume R, Barreiro C, Bouda J, Boxleitner W, Debuisschert T, Diamanti E, Dianati M, Dynes JF, Fasel S, Fossier S, Fürst M, Gautier JD, Gay O, ... ... Salvail L, et al. The SECOQC quantum key distribution network in Vienna New Journal of Physics. 11. DOI: 10.1088/1367-2630/11/7/075001 |
0.464 |
|
2009 |
Salvail L, Schaffner C, Sotáková M. On the power of two-party quantum cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5912: 70-87. DOI: 10.1007/978-3-642-10366-7_5 |
0.54 |
|
2009 |
Damgård I, Fehr S, Lunemann C, Salvail L, Schaffner C. Improving the security of quantum protocols via commit-and-open Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 408-427. DOI: 10.1007/978-3-642-03356-8_24 |
0.591 |
|
2008 |
Brassard G, Salvail L. Quantum merkle puzzles Proceedings - the 2nd International Conference On Quantum-, Nano- and Micro-Technologies, Icqnm 2008. 76-79. DOI: 10.1109/ICQNM.2008.16 |
0.55 |
|
2007 |
Damgård IB, Fehr S, Salvail L, Schaffner C. Cryptography in the bounded-quantum-storage model Siam Journal On Computing. 37: 1865-1890. DOI: 10.1137/060651343 |
0.416 |
|
2007 |
Peev M, Alléaume R, Länger T, Lütkenhaus N, Salvail L. A quantum key distribution network: Integrated design and prototypical implementation Conference On Lasers and Electro-Optics Europe - Technical Digest. DOI: 10.1109/CLEOE-IQEC.2007.4387009 |
0.375 |
|
2007 |
Peev M, Alléaume R, Länger T, Lütkenhaus N, Salvail L. A quantum key distribution network: Integrated design and prototypical implementation Optics Infobase Conference Papers. |
0.375 |
|
2007 |
Damgård IB, Fehr S, Renner R, Salvail L, Schaffner C. A tight high-order entropie quantum uncertainty relation with applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4622: 360-378. |
0.585 |
|
2006 |
Damgård I, Pedersen TB, Salvail L. A quantum cipher with near optimal key-recycling Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 494-510. DOI: 10.7146/Brics.V12I17.21883 |
0.618 |
|
2006 |
Arrighi P, Salvail L. Blind quantum computation International Journal of Quantum Information. 4: 883-898. DOI: 10.1142/S0219749906002171 |
0.446 |
|
2006 |
Damgård IB, Fehr S, Salvail L, Schaffner C. Oblivious transfer and linear functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4117: 427-444. |
0.338 |
|
2005 |
Damgård IB, Fehr S, Salvail L, Schaffner C. Cryptography in the bounded quantum-storage model 2005 Ieee Information Theory Workshop On Theory and Practice in Information-Theoretic Security. 2005: 24-27. DOI: 10.7146/Brics.V12I20.21886 |
0.467 |
|
2004 |
Damgård I, Fehr S, Salvail L. Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3152: 254-272. DOI: 10.7146/Brics.V11I9.21834 |
0.627 |
|
2004 |
Damgård I, Fehr S, Morozov K, Salvail L. Unfair noisy channels and oblivious transfer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2951: 355-373. DOI: 10.7146/Brics.V10I36.21804 |
0.415 |
|
2004 |
Crépeau C, Dumais P, Mayers D, Salvail L. Computational collapse of quantum state with application to oblivious transfer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2951: 374-393. |
0.404 |
|
2004 |
Damgård I, Pedersen T, Salvail L. On the key-uncertainty of quantum ciphers and the computational security of one-way quantum transmission Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 91-108. |
0.581 |
|
2003 |
Crépeau C, Dumais P, Mayers D, Salvail L. Computational Collapse of Quantum State with Application to Oblivious Transfer Brics Report Series. 10. DOI: 10.7146/Brics.V10I37.21805 |
0.624 |
|
2003 |
Crépeau C, Dumais P, Mayers D, Salvail L. On the Computational Collapse of Quantum Information Brics Report Series. 10. DOI: 10.7146/Brics.V10I3.21774 |
0.605 |
|
2001 |
Nielsen PM, Schori C, Sørensen JL, Salvail L, Damgård I, Polzik E. Experimental quantum key distribution with proven security against realistic attacks Journal of Modern Optics. 48: 1921-1942. DOI: 10.1080/09500340110069237 |
0.549 |
|
2001 |
Crépeau C, Légaré F, Salvail L. How to convert the flavor of a quantum bit commitment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2045: 60-77. |
0.51 |
|
2000 |
Crépeau C, Légaré F, Salvail L. How to Convert a Flavor of Quantum Bit Commitment Brics Report Series. 7. DOI: 10.7146/Brics.V7I52.20219 |
0.537 |
|
2000 |
Dumais P, Mayers D, Salvail L. Perfectly concealing quantum bit commitment from any quantum one-way permutation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1807: 300-315. |
0.567 |
|
1999 |
Damgård I, Kilian J, Salvail L. On the (Im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1592: 56-73. DOI: 10.7146/Brics.V5I37.19442 |
0.386 |
|
1999 |
Salvail L. The Search for the Holy Grail in Quantum Cryptography Lecture Notes in Computer Science. 183-216. DOI: 10.1007/3-540-48969-X_9 |
0.641 |
|
1998 |
Salvail L. Quantum bit commitment from a physical assumption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1462: 338-353. DOI: 10.1007/BFb0055740 |
0.445 |
|
1992 |
Bennett CH, Bessette F, Brassard G, Salvail L, Smolin J. Experimental quantum cryptography Journal of Cryptology. 5: 3-28. DOI: 10.1007/BF00191318 |
0.529 |
|
Show low-probability matches. |