Search Results - "Wullschleger, Jürg"

Refine Results
  1. 1

    Cytochrome b gene sequence and structure of Pyrenophora teres and P. tritici-repentis and implications for QoI resistance by Sierotzki, H, Frey, R, Wullschleger, J, Palermo, S, Karlin, S, Godwin, J, Gisi, U

    Published in Pest management science (01-03-2007)
    “…Resistance to QoI fungicides in Pyrenophora teres (Dreschsler) and P. tritici-repentis (Died.) Dreschsler was detected in 2003 in France and in Sweden and…”
    Get full text
    Journal Article
  2. 2

    New Monotones and Lower Bounds in Unconditional Two-Party Computation by Wolf, S., Wullschleger, J.

    Published in IEEE transactions on information theory (01-06-2008)
    “…Since oblivious transfer, a primitive of paramount importance in secure two- and multiparty computation, cannot be realized in an unconditionally secure way…”
    Get full text
    Journal Article
  3. 3

    Bit Commitment From Nonsignaling Correlations by Winkler, Severin, Wullschleger, Jürg, Wolf, Stefan

    Published in IEEE transactions on information theory (01-03-2011)
    “…Central cryptographic functionalities such as encryption, authentication, or secure two-party computation cannot be realized in an information-theoretically…”
    Get full text
    Journal Article
  4. 4

    On the Efficiency of Classical and Quantum Secure Function Evaluation by Winkler, Severin, Wullschleger, Jurg

    Published in IEEE transactions on information theory (01-06-2014)
    “…We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite functions from trusted distributed randomness in the…”
    Get full text
    Journal Article
  5. 5

    One-Shot Decoupling by Dupuis, Frédéric, Berta, Mario, Wullschleger, Jürg, Renner, Renato

    Published in Communications in mathematical physics (21-03-2014)
    “…If a quantum system A , which is initially correlated to another system, E , undergoes an evolution separated from E , then the correlation to E generally…”
    Get full text
    Journal Article
  6. 6

    Unconditional Security From Noisy Quantum Storage by Konig, R., Wehner, S., Wullschleger, J.

    Published in IEEE transactions on information theory (01-03-2012)
    “…We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to…”
    Get full text
    Journal Article
  7. 7

    Oblivious transfer and quantum channels as communication resources by Gisin, Nicolas, Popescu, Sandu, Scarani, Valerio, Wolf, Stefan, Wullschleger, Jürg

    Published in Natural computing (01-03-2013)
    “…We show that from a communication-complexity perspective, the primitive called oblivious transfer —which was introduced in a cryptographic context—can be seen…”
    Get full text
    Journal Article
  8. 8

    Single-use ot combiners with near-optimal resilience by Ishai, Yuval, Maji, Hemanta K., Sahai, Amit, Wullschleger, Jurg

    “…An oblivious transfer (OT) channel takes as input a pair of bits (s 0 , s 1 ) from the sender and delivers (c, s c ) to the receiver, where c ∈ {0, 1} is…”
    Get full text
    Conference Proceeding
  9. 9

    Cytochrome b gene sequence and structure of Pyrenophora teres and P. tritici-repentis and implications for Qol resistance by SIEROTZKI, Helge, FREY, Regula, WULLSCHLEGER, Jürg, PALERMO, Simona, KARLIN, Serge, GODWIN, Jeremy, GISI, Ulrich

    Published in Pest management science (01-03-2007)
    “…Resistance to Qol fungicides in Pyrenophora teres (Dreschsler) and P. tritici-repentis (Died.) Dreschsler was detected in 2003 in France and in Sweden and…”
    Get full text
    Journal Article
  10. 10

    Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access Codes by Wullschleger, Jürg

    Published 10-12-2010
    “…Min-entropy sampling gives a bound on the min-entropy of a randomly chosen subset of a string, given a bound on the min-entropy of the whole string. K\"onig…”
    Get full text
    Journal Article
  11. 11

    On the Efficiency of Classical and Quantum Secure Function Evaluation by Winkler, Severin, Wullschleger, Jürg

    Published 08-05-2014
    “…IEEE Trans. Inf. Th., vol. 60, no. 6, p. 1-21 (2014) We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite…”
    Get full text
    Journal Article
  12. 12

    Tight bounds for classical and quantum coin flipping by Hänggi, Esther, Wullschleger, Jürg

    Published 26-04-2011
    “…Proceedings of TCC 2011, p 468-485 Coin flipping is a cryptographic primitive for which strictly better protocols exist if the players are not only allowed to…”
    Get full text
    Journal Article
  13. 13

    Oblivious-Transfer Amplification by Wullschleger, Jürg

    Published 18-08-2006
    “…Oblivious transfer is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality…”
    Get full text
    Journal Article
  14. 14

    Zero-error communication over networks by Wullschleger, Jürg

    Published 01-07-2004
    “…Zero-Error communication investigates communication without any error. By defining channels without probabilities, results from Elias can be used to completely…”
    Get full text
    Journal Article
  15. 15

    One-shot decoupling by Dupuis, Frédéric, Berta, Mario, Wullschleger, Jürg, Renner, Renato

    Published 13-05-2014
    “…Commun. Math. Phys. 328, 251 (2014) If a quantum system A, which is initially correlated to another system, E, undergoes an evolution separated from E, then…”
    Get full text
    Journal Article
  16. 16

    Composable Security in the Bounded-Quantum-Storage Model by Wehner, Stephanie, Wullschleger, Jürg

    Published 04-09-2007
    “…Proceedings of ICALP 2008, pages 604--615 We present a simplified framework for proving sequential composability in the quantum setting. In particular, we give…”
    Get full text
    Journal Article
  17. 17

    Oblivious transfer and quantum non-locality by Wolf, Stefan, Wullschleger, Jürg

    Published 03-02-2005
    “…Oblivious transfer, a central functionality in modern cryptography, allows a party to send two one-bit messages to another who can choose one of them to read,…”
    Get full text
    Journal Article
  18. 18

    Oblivious transfer and quantum non-locality by Wolf, S., Wullschleger, J.

    “…Oblivious transfer, a central functionality in modern cryptography, allows a party to send two one-bit messages to another who can choose one of them to read,…”
    Get full text
    Conference Proceeding
  19. 19

    The Single-Serving Channel Capacity by Renner, R., Wolf, S., Wullschleger, J.

    “…In this paper we provide the answer to the following question: given a noisy channel P Y|X and epsi > 0, how many bits can be transmitted with an error of at…”
    Get full text
    Conference Proceeding
  20. 20

    Cytochrome b gene sequence and structure of Pyrenophora teres and P. tritici-repentis and implications for QoI resistance by Sierotzki, Helge, Frey, Regula, Wullschleger, Jurg, Palermo, Simona, Karlin, Serge, Godwin, Jeremy, Gisi, Ulrich

    Published in Pest management science (01-03-2007)
    “…Resistance to QoI fungicides in Pyrenophora teres (Dreschsler) and P. tritici-repentis (Died.) Dreschsler was detected in 2003 in France and in Sweden and…”
    Get full text
    Journal Article