The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christian Schaffner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
    Oblivious Transfer and Linear Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:427-444 [Conf]
  2. Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
    Information-Theoretic Conditions for Two-Party Secure Function Evaluation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:538-554 [Conf]
  3. Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
    Cryptography In the Bounded Quantum-Storage Model. [Citation Graph (0, 0)][DBLP]
    FOCS, 2005, pp:449-458 [Conf]
  4. Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
    Secure Identification and QKD in the Bounded-Quantum-Storage Model. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:342-359 [Conf]
  5. Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
    A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:360-378 [Conf]
  6. Serge Fehr, Christian Schaffner
    Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  7. Ivan B. Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
    A Tight High-Order Entropic Quantum Uncertainty Relation With Applications [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  8. Christian Schaffner
    Cryptography in the Bounded-Quantum-Storage Model [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  9. On the Power of Two-Party Quantum Cryptography. [Citation Graph (, )][DBLP]


  10. Improving the Security of Quantum Protocols via Commit-and-Open. [Citation Graph (, )][DBLP]


  11. Randomness Extraction Via delta -Biased Masking in the Presence of a Quantum Attacker. [Citation Graph (, )][DBLP]


  12. Composing Quantum Protocols in a Classical Environment. [Citation Graph (, )][DBLP]


  13. Cryptography In the Bounded Quantum-Storage Model [Citation Graph (, )][DBLP]


  14. Cryptography from Noisy Photonic Storage [Citation Graph (, )][DBLP]


  15. Random Oracles in a Quantum World [Citation Graph (, )][DBLP]


Search in 0.012secs, Finished in 0.013secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002