No. | Title | Author | Year |
---|---|---|---|
1 | A Constant Lower Bound for Any Quantum Protocol for Secure Function Evaluation | Osborn, Sarah A. et al. | 2022 |
2 | A Device-Independent Protocol for XOR Oblivious Transfer | Kundu, Srijita et al. | 2020 |
3 | Fidelity of Quantum Strategies with Applications to Cryptography | Gutoski, Gus et al. | 2018 |
4 | Quantum Generalizations of the Polynomial Hierarchy with Applications to QMA(2) | Gharibian, Sevag et al. | 2018 |
5 | Simple, Near-Optimal Quantum Protocols for Die-Rolling | Sikora, Jamie | 2016 |
6 | Optimal Bounds for Parity-Oblivious Random Access Codes with Applications | Chailloux, André et al. | 2014 |
7 | Lower bounds for Quantum Oblivious Transfer | Chailloux, André et al. | 2010 |
Current Page : | |
Number of result pages: | 1 |
Number of documents: | 7 |