Entropic uncertainty relations and their applications

PJ Coles, M Berta, M Tomamichel, S Wehner - Reviews of Modern Physics, 2017 - APS
Heisenberg's uncertainty principle forms a fundamental element of quantum mechanics.
Uncertainty relations in terms of entropies were initially proposed to deal with conceptual …

Quantum cryptography beyond quantum key distribution

A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …

[LLIBRE][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

System and methods to compensate for Doppler effects in multi-user (MU) multiple antenna systems (MAS)

A Forenza, SG Perlman - US Patent 9,312,929, 2016 - Google Patents
US9312929B2 - System and methods to compensate for Doppler effects in multi-user (MU)
multiple antenna systems (MAS) - Google Patents US9312929B2 - System and methods to …

Leakage-resilient cryptography

S Dziembowski, K Pietrzak - 2008 49th Annual IEEE …, 2008 - ieeexplore.ieee.org
We construct a stream-cipher S whose implementation is secure even if a bounded amount
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …

System and methods for planned evolution and obsolescence of multiuser spectrum

SG Perlman, A Forenza - US Patent 10,425,134, 2019 - Google Patents
URWAJWIAIPFPJE-YFMIWBNJSA-N sisomycin Chemical compound O1C
[C@@](O)(C)[C@ H](NC)[C@@ H](O)[C@ H] 1O [C@@ H] 1 [C@@ H](O)[C@ H](O [C …

A survey of single-database private information retrieval: Techniques and applications

R Ostrovsky, WE Skeith III - International Workshop on Public Key …, 2007 - Springer
In this paper we survey the notion of Single-Database Private Information Retrieval (PIR).
The first Single-Database PIR was constructed in 1997 by Kushilevitz and Ostrovsky and …

Cryptography in the bounded-quantum-storage model

IB Damgård, S Fehr, L Salvail, C Schaffner - SIAM Journal on Computing, 2008 - SIAM
We initiate the study of two-party cryptographic primitives with unconditional security,
assuming that the adversary's quantum memory is of bounded size. We show that oblivious …

A leakage-resilient mode of operation

K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …

Position based cryptography

N Chandran, V Goyal, R Moriarty… - Annual International …, 2009 - Springer
We consider what constitutes identities in cryptography. Typical examples include your
name and your social-security number, or your fingerprint/iris-scan, or your address, or your …