The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Charles H. Bennett: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Charles H. Bennett, Gilles Brassard
    An Update on Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:475-480 [Conf]
  2. Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska
    Practical Quantum Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:351-366 [Conf]
  3. Charles H. Bennett, Gilles Brassard, Jean-Marc Robert
    How to Reduce Your Enemy's Information (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:468-476 [Conf]
  4. Charles H. Bennett, Gilles Brassard, Seth Breidbard, Stephen Wiesner
    Quantum Cryptography, or Unforgeable Subway Tokens. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:267-275 [Conf]
  5. Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin
    Experimental Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:253-265 [Conf]
  6. Charles H. Bennett, Péter Gács, Ming Li, Paul M. B. Vitányi, Wojciech H. Zurek
    Thermodynamics of computation and information distance. [Citation Graph (0, 0)][DBLP]
    STOC, 1993, pp:21-30 [Conf]
  7. Charles H. Bennett
    Rolf Landauer - in Memoriam. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2000, v:10, n:4/5, pp:273-276 [Journal]
  8. Charles H. Bennett, John A. Smolin
    Trust enhancement by multiple random beacons [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  9. Charles H. Bennett
    Improvements to time bracketed authentication [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  10. Charles H. Bennett
    Notes on the history of reversible computation. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2000, v:44, n:1, pp:270-278 [Journal]
  11. Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin
    Experimental Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:1, pp:3-28 [Journal]
  12. Charles H. Bennett
    Time/Space Trade-Offs for Reversible Computation. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1989, v:18, n:4, pp:766-776 [Journal]
  13. Charles H. Bennett, Ethan Bernstein, Gilles Brassard, Umesh V. Vazirani
    Strengths and Weaknesses of Quantum Computing. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1997, v:26, n:5, pp:1510-1523 [Journal]
  14. Charles H. Bennett, Gilles Brassard, Jean-Marc Robert
    Privacy Amplification by Public Discussion. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:210-229 [Journal]
  15. Charles H. Bennett, John Gill
    Relative to a Random Oracle A, P^A != NP^A != co-NP^A with Probability 1. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1981, v:10, n:1, pp:96-113 [Journal]
  16. Charles H. Bennett, Gilles Brassard, Claude Crépeau, Ueli M. Maurer
    Generalized privacy amplification. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1995, v:41, n:6, pp:1915-1923 [Journal]
  17. Charles H. Bennett, Péter Gács, Ming Li, Paul M. B. Vitányi, Wojciech H. Zurek
    Information Distance. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:4, pp:1407-1423 [Journal]
  18. Charles H. Bennett, Aram Wettroth Harrow, Debbie W. Leung, John A. Smolin
    On the capacities of bipartite Hamiltonians and unitary gates. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:8, pp:1895-1911 [Journal]
  19. Charles H. Bennett, Patrick M. Hayden, Debbie W. Leung, Peter W. Shor, Andreas J. Winter
    Remote preparation of quantum states. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:1, pp:56-74 [Journal]
  20. Charles H. Bennett, Peter W. Shor
    Quantum Information Theory. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:6, pp:2724-2742 [Journal]
  21. Charles H. Bennett, Peter W. Shor, John A. Smolin, Ashish V. Thapliyal
    Entanglement-assisted capacity of a quantum channel and the reverse Shannon theorem. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:10, pp:2637-2655 [Journal]
  22. Charles H. Bennett
    Quantum Cryptography: Principles and Prospects (Quantumkryptographie: Prinzipien und Ausblick). [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2006, v:48, n:6, pp:332-0 [Journal]

  23. Information Distance [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002