Search Results - "Wullschleger, Jürg"
-
1
Cytochrome b gene sequence and structure of Pyrenophora teres and P. tritici-repentis and implications for QoI resistance
Published in Pest management science (01-03-2007)“…Resistance to QoI fungicides in Pyrenophora teres (Dreschsler) and P. tritici-repentis (Died.) Dreschsler was detected in 2003 in France and in Sweden and…”
Get full text
Journal Article -
2
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Published in IEEE transactions on information theory (01-06-2008)“…Since oblivious transfer, a primitive of paramount importance in secure two- and multiparty computation, cannot be realized in an unconditionally secure way…”
Get full text
Journal Article -
3
Bit Commitment From Nonsignaling Correlations
Published in IEEE transactions on information theory (01-03-2011)“…Central cryptographic functionalities such as encryption, authentication, or secure two-party computation cannot be realized in an information-theoretically…”
Get full text
Journal Article -
4
On the Efficiency of Classical and Quantum Secure Function Evaluation
Published in IEEE transactions on information theory (01-06-2014)“…We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite functions from trusted distributed randomness in the…”
Get full text
Journal Article -
5
One-Shot Decoupling
Published in Communications in mathematical physics (21-03-2014)“…If a quantum system A , which is initially correlated to another system, E , undergoes an evolution separated from E , then the correlation to E generally…”
Get full text
Journal Article -
6
Unconditional Security From Noisy Quantum Storage
Published in IEEE transactions on information theory (01-03-2012)“…We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to…”
Get full text
Journal Article -
7
Oblivious transfer and quantum channels as communication resources
Published in Natural computing (01-03-2013)“…We show that from a communication-complexity perspective, the primitive called oblivious transfer —which was introduced in a cryptographic context—can be seen…”
Get full text
Journal Article -
8
Single-use ot combiners with near-optimal resilience
Published in 2014 IEEE International Symposium on Information Theory (01-06-2014)“…An oblivious transfer (OT) channel takes as input a pair of bits (s 0 , s 1 ) from the sender and delivers (c, s c ) to the receiver, where c ∈ {0, 1} is…”
Get full text
Conference Proceeding -
9
Cytochrome b gene sequence and structure of Pyrenophora teres and P. tritici-repentis and implications for Qol resistance
Published in Pest management science (01-03-2007)“…Resistance to Qol fungicides in Pyrenophora teres (Dreschsler) and P. tritici-repentis (Died.) Dreschsler was detected in 2003 in France and in Sweden and…”
Get full text
Journal Article -
10
Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access Codes
Published 10-12-2010“…Min-entropy sampling gives a bound on the min-entropy of a randomly chosen subset of a string, given a bound on the min-entropy of the whole string. K\"onig…”
Get full text
Journal Article -
11
On the Efficiency of Classical and Quantum Secure Function Evaluation
Published 08-05-2014“…IEEE Trans. Inf. Th., vol. 60, no. 6, p. 1-21 (2014) We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite…”
Get full text
Journal Article -
12
Tight bounds for classical and quantum coin flipping
Published 26-04-2011“…Proceedings of TCC 2011, p 468-485 Coin flipping is a cryptographic primitive for which strictly better protocols exist if the players are not only allowed to…”
Get full text
Journal Article -
13
Oblivious-Transfer Amplification
Published 18-08-2006“…Oblivious transfer is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality…”
Get full text
Journal Article -
14
Zero-error communication over networks
Published 01-07-2004“…Zero-Error communication investigates communication without any error. By defining channels without probabilities, results from Elias can be used to completely…”
Get full text
Journal Article -
15
One-shot decoupling
Published 13-05-2014“…Commun. Math. Phys. 328, 251 (2014) If a quantum system A, which is initially correlated to another system, E, undergoes an evolution separated from E, then…”
Get full text
Journal Article -
16
Composable Security in the Bounded-Quantum-Storage Model
Published 04-09-2007“…Proceedings of ICALP 2008, pages 604--615 We present a simplified framework for proving sequential composability in the quantum setting. In particular, we give…”
Get full text
Journal Article -
17
Oblivious transfer and quantum non-locality
Published 03-02-2005“…Oblivious transfer, a central functionality in modern cryptography, allows a party to send two one-bit messages to another who can choose one of them to read,…”
Get full text
Journal Article -
18
Oblivious transfer and quantum non-locality
Published in Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 (2005)“…Oblivious transfer, a central functionality in modern cryptography, allows a party to send two one-bit messages to another who can choose one of them to read,…”
Get full text
Conference Proceeding -
19
The Single-Serving Channel Capacity
Published in 2006 IEEE International Symposium on Information Theory (01-07-2006)“…In this paper we provide the answer to the following question: given a noisy channel P Y|X and epsi > 0, how many bits can be transmitted with an error of at…”
Get full text
Conference Proceeding -
20
Cytochrome b gene sequence and structure of Pyrenophora teres and P. tritici-repentis and implications for QoI resistance
Published in Pest management science (01-03-2007)“…Resistance to QoI fungicides in Pyrenophora teres (Dreschsler) and P. tritici-repentis (Died.) Dreschsler was detected in 2003 in France and in Sweden and…”
Get full text
Journal Article