Christian Schaffner
Christian Schaffner
University of Amsterdam & QuSoft
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
The operational meaning of min-and max-entropy
R Koenig, R Renner, C Schaffner
Arxiv preprint ArXiv:0807.1338, 2008
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
International conference on the theory and application of cryptology and …, 2011
Cryptography in the bounded-quantum-storage model
IB Damgård, S Fehr, L Salvail, C Schaffner
SIAM Journal on Computing 37 (6), 1865-1890, 2008
Leftover hashing against quantum side information
M Tomamichel, C Schaffner, A Smith, R Renner
IEEE Transactions on Information Theory 57 (8), 5524-5535, 2011
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
Quantum cryptography beyond quantum key distribution
A Broadbent, C Schaffner
Designs, Codes and Cryptography 78 (1), 351-382, 2016
Cryptography from noisy storage
S Wehner, C Schaffner, BM Terhal
Physical review letters 100 (22), 220502, 2008
A tight high-order entropic quantum uncertainty relation with applications
IB Damgård, S Fehr, R Renner, L Salvail, C Schaffner
Proceedings of the 27th annual international cryptology conference on …, 2007
Security and composability of randomness expansion from Bell inequalities
S Fehr, R Gelles, C Schaffner
Physical Review A 87 (1), 012335, 2013
Secure identification and QKD in the bounded-quantum-storage model
IB Damgård, S Fehr, L Salvail, C Schaffner
Annual International Cryptology Conference, 342-359, 2007
A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
E Kiltz, V Lyubashevsky, C Schaffner
Annual International Conference on the Theory and Applications of …, 2018
Quantum homomorphic encryption for polynomial-sized circuits
Y Dulek, C Schaffner, F Speelman
Annual International Cryptology Conference, 3-32, 2016
Complete insecurity of quantum protocols for classical two-party computation
H Buhrman, M Christandl, C Schaffner
Physical review letters 109 (16), 160501, 2012
Security of the Fiat-Shamir transformation in the quantum random-oracle model
J Don, S Fehr, C Majenz, C Schaffner
Annual International Cryptology Conference, 356-383, 2019
Using Simon's algorithm to attack symmetric-key cryptographic primitives
T Santoli, C Schaffner
arXiv preprint arXiv:1603.07856, 2016
Semantic security and indistinguishability in the quantum world
T Gagliardoni, A Hülsing, C Schaffner
Annual international cryptology conference, 60-89, 2016
Implementation of two-party protocols in the noisy-storage model
S Wehner, M Curty, C Schaffner, HK Lo
Physical Review A 81 (5), 052336, 2010
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
C Schaffner
Physical Review A 82 (3), 032308, 2010
Composing quantum protocols in a classical environment
S Fehr, C Schaffner
Theory of Cryptography Conference, 350-367, 2009
On the power of two-party quantum cryptography
L Salvail, C Schaffner, M Sotáková
International Conference on the Theory and Application of Cryptology and …, 2009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20