Search Results - "Wullschleger, J"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Unconditional Security From Noisy Quantum Storage by Konig, R., Wehner, S., Wullschleger, J.

    Published in IEEE transactions on information theory (01-03-2012)
    “…We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to…”
    Get full text
    Journal Article
  2. 2

    New Monotones and Lower Bounds in Unconditional Two-Party Computation by Wolf, S., Wullschleger, J.

    Published in IEEE transactions on information theory (01-06-2008)
    “…Since oblivious transfer, a primitive of paramount importance in secure two- and multiparty computation, cannot be realized in an unconditionally secure way…”
    Get full text
    Journal Article
  3. 3

    Point Mutation in Cytochrome b Gene Conferring Resistance to Strobilurin Fungicides in Erysiphe graminis f. sp. tritici Field Isolates by Sierotzki, H., Wullschleger, J., Gisi, U.

    Published in Pesticide biochemistry and physiology (01-10-2000)
    “…A field isolate of Erysiphe graminis f. sp. tritici that was more than 200-fold less sensitive to strobilurin fungicides (respiration inhibitors at the Qo…”
    Get full text
    Journal Article
  4. 4

    Fish species composition before and after construction of a main stem reservoir on the White River, Colorado by Martinez, P.J. (Colorado Div. of Wildlife, Fort Collins, CO (USA). Wildlife Research Center), Chart, T.E, Trammell, M.A, Wullschleger, J.G, Bergersen, E.P

    Published in Environmental biology of fishes (01-07-1994)
    “…The effects of dam and reservoir construction on fish species composition in the White River, CO, were studied. Preimpoundment fish surveys in 1983-84 showed…”
    Get full text
    Journal Article
  5. 5

    On the Efficiency of Classical and Quantum Secure Function Evaluation by Winkler, Severin, Wullschleger, Jurg

    Published in IEEE transactions on information theory (01-06-2014)
    “…We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite functions from trusted distributed randomness in the…”
    Get full text
    Journal Article
  6. 6

    Cytochrome b gene sequence and structure of Pyrenophora teres and P. tritici-repentis and implications for QoI resistance by Sierotzki, H, Frey, R, Wullschleger, J, Palermo, S, Karlin, S, Godwin, J, Gisi, U

    Published in Pest management science (01-03-2007)
    “…Resistance to QoI fungicides in Pyrenophora teres (Dreschsler) and P. tritici-repentis (Died.) Dreschsler was detected in 2003 in France and in Sweden and…”
    Get full text
    Journal Article
  7. 7

    Bit Commitment From Nonsignaling Correlations by Winkler, Severin, Wullschleger, Jürg, Wolf, Stefan

    Published in IEEE transactions on information theory (01-03-2011)
    “…Central cryptographic functionalities such as encryption, authentication, or secure two-party computation cannot be realized in an information-theoretically…”
    Get full text
    Journal Article
  8. 8

    Bit commitment from weak non-locality by Wolf, S., Wullschleger, J.

    “…So-called non-local boxes, which have been introduced as an idealization n different respects - of the behavior of entangled quantum states, have been known to…”
    Get full text
    Conference Proceeding
  9. 9

    Oblivious transfer and quantum non-locality by Wolf, S., Wullschleger, J.

    “…Oblivious transfer, a central functionality in modern cryptography, allows a party to send two one-bit messages to another who can choose one of them to read,…”
    Get full text
    Conference Proceeding
  10. 10

    The Single-Serving Channel Capacity by Renner, R., Wolf, S., Wullschleger, J.

    “…In this paper we provide the answer to the following question: given a noisy channel P Y|X and epsi > 0, how many bits can be transmitted with an error of at…”
    Get full text
    Conference Proceeding
  11. 11

    Zero-error communication over networks by Wullschleger, J.

    “…This paper introduces the ambiguity of a channel, which characterizes the possibility in principle of a zero-error channel to simulate any other zero-error…”
    Get full text
    Conference Proceeding
  12. 12

    Zero-error information and applications in cryptography by Wolf, S., Wultschleger, J.

    Published in Information Theory Workshop (2004)
    “…In analogy to the zero-error variant of the channel capacity, the zero-error information between two random variables is defined. We show that our definition…”
    Get full text
    Conference Proceeding
  13. 13

    On the Power of Imperfect Broadcast by Fitzi, M., Wolf, S., Wullschleger, J.

    “…A fundamental result in information-theoretic fault-tolerant distributed computing is that unconditionally secure broadcast (or Byzantine agreement) among…”
    Get full text
    Conference Proceeding
  14. 14

    Oblivious Transfer and Quantum Channels by Gisin, N., Popescu, S., Scarani, V., Wolf, S., Wullschleger, J.

    “…We show that oblivious transfer can be seen as the classical analogue to a quantum channel in the same sense as non-local boxes are for maximally entangled…”
    Get full text
    Conference Proceeding
  15. 15