Search Results - "Wullschleger, J"
-
1
Unconditional Security From Noisy Quantum Storage
Published in IEEE transactions on information theory (01-03-2012)“…We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to…”
Get full text
Journal Article -
2
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Published in IEEE transactions on information theory (01-06-2008)“…Since oblivious transfer, a primitive of paramount importance in secure two- and multiparty computation, cannot be realized in an unconditionally secure way…”
Get full text
Journal Article -
3
Point Mutation in Cytochrome b Gene Conferring Resistance to Strobilurin Fungicides in Erysiphe graminis f. sp. tritici Field Isolates
Published in Pesticide biochemistry and physiology (01-10-2000)“…A field isolate of Erysiphe graminis f. sp. tritici that was more than 200-fold less sensitive to strobilurin fungicides (respiration inhibitors at the Qo…”
Get full text
Journal Article -
4
Fish species composition before and after construction of a main stem reservoir on the White River, Colorado
Published in Environmental biology of fishes (01-07-1994)“…The effects of dam and reservoir construction on fish species composition in the White River, CO, were studied. Preimpoundment fish surveys in 1983-84 showed…”
Get full text
Journal Article -
5
On the Efficiency of Classical and Quantum Secure Function Evaluation
Published in IEEE transactions on information theory (01-06-2014)“…We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite functions from trusted distributed randomness in the…”
Get full text
Journal Article -
6
Cytochrome b gene sequence and structure of Pyrenophora teres and P. tritici-repentis and implications for QoI resistance
Published in Pest management science (01-03-2007)“…Resistance to QoI fungicides in Pyrenophora teres (Dreschsler) and P. tritici-repentis (Died.) Dreschsler was detected in 2003 in France and in Sweden and…”
Get full text
Journal Article -
7
Bit Commitment From Nonsignaling Correlations
Published in IEEE transactions on information theory (01-03-2011)“…Central cryptographic functionalities such as encryption, authentication, or secure two-party computation cannot be realized in an information-theoretically…”
Get full text
Journal Article -
8
Bit commitment from weak non-locality
Published in IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005 (2005)“…So-called non-local boxes, which have been introduced as an idealization n different respects - of the behavior of entangled quantum states, have been known to…”
Get full text
Conference Proceeding -
9
Oblivious transfer and quantum non-locality
Published in Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 (2005)“…Oblivious transfer, a central functionality in modern cryptography, allows a party to send two one-bit messages to another who can choose one of them to read,…”
Get full text
Conference Proceeding -
10
The Single-Serving Channel Capacity
Published in 2006 IEEE International Symposium on Information Theory (01-07-2006)“…In this paper we provide the answer to the following question: given a noisy channel P Y|X and epsi > 0, how many bits can be transmitted with an error of at…”
Get full text
Conference Proceeding -
11
Zero-error communication over networks
Published in International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings (2004)“…This paper introduces the ambiguity of a channel, which characterizes the possibility in principle of a zero-error channel to simulate any other zero-error…”
Get full text
Conference Proceeding -
12
Zero-error information and applications in cryptography
Published in Information Theory Workshop (2004)“…In analogy to the zero-error variant of the channel capacity, the zero-error information between two random variables is defined. We show that our definition…”
Get full text
Conference Proceeding -
13
On the Power of Imperfect Broadcast
Published in 2006 IEEE International Symposium on Information Theory (01-07-2006)“…A fundamental result in information-theoretic fault-tolerant distributed computing is that unconditionally secure broadcast (or Byzantine agreement) among…”
Get full text
Conference Proceeding -
14
Oblivious Transfer and Quantum Channels
Published in 2006 IEEE Information Theory Workshop - ITW '06 Punta del Este (2006)“…We show that oblivious transfer can be seen as the classical analogue to a quantum channel in the same sense as non-local boxes are for maximally entangled…”
Get full text
Conference Proceeding -
15
Numerische Lösung der Bilanzgleichungen des gepulsten CO2-Lasers und Vergleich mit dem Experiment
Published in Zeitschrift für angewandte Mathematik und Physik (01-09-1975)Get full text
Journal Article